Media and Information Literacy lesson 7-8.pptx

ailen1107 297 views 35 slides Aug 06, 2024
Slide 1
Slide 1 of 35
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35

About This Presentation

Media and Information Literacy


Slide Content

Lesson 7: Legal, Ethical and Societal Issues in Media and Information Literacy

Objectives Identify the different issues in media and information literacy, common issues on data privacy and core rules of netiquette. Classify the opportunities, challenges and power of media and information. Create a poster and slogan about the power of media and information

Digital Citizenship Ability to find, access, use, and create information effectively; engage with other users and with content in an active, critical, sensitive and ethical manner; and navigate the online and ICT environment safely and responsibly, being aware of one’s own rights (UNESCO, 2016)

Issues in Media and Information Literacy

Intellectual Property Refers to the “creation of the mind such as inventions, literary and artistic works, designs, symbols, names, and images used in commerce”

Geographical indications and appellation of origin Industrial design Trademark Patent Fair Use Plagiarism Copyright Types of Intellectual Property

Geographical indications and appellation of origin Industrial design Trademark Patent Fair Use Plagiarism Copyright A legal term used to describe the rights that creators have over their literary and artistic works and give the creator the sole right to publish and sell that work .

Geographical indications and appellation of origin Industrial design Trademark Patent Fair Use Plagiarism Copyright An act or instance of using or closely imitating the language and thoughts of another author without authorization; the representation of that author’s work as one’s own, as by not crediting the original author.

Geographical indications and appellation of origin Industrial design Trademark Patent Fair Use Plagiarism Copyright A legal principle stating that one can use a copyrighted work without a license for the following purposes: commentary, criticism, reposting, research, and teaching

Geographical indications and appellation of origin Industrial design Trademark Patent Fair Use Plagiarism Copyright Exclusive right granted for an invention, which is a product or a process that provides, in general, a new way of doing something, or offers a new technical solution to a problem .

Geographical indications and appellation of origin Industrial design Trademark Patent Fair Use Plagiarism Copyright Distinguished sign of goods or services that identifies and differentiate from one enterprise to another; a signature work.

Geographical indications and appellation of origin Industrial design Trademark Patent Fair Use Plagiarism Copyright Protects only the appearance or aesthetic features of a product such as shape, surface, patterns, lines, or color .

Geographical indications and appellation of origin Industrial design Trademark Patent Fair Use Plagiarism Copyright Signs used on products possessing qualities, a status or characteristics that are essentially attributable to that location of origin

Common Issues on Data Privacy PHISHING HACKING Involves activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. INDENTITY THEF A type of social engineering attack often used to seal user data, including login credentials and credit card numbers. Occurs when a criminal obtains or uses the personal information of someone else to assume their identity or access their accounts for the purpose of committing fraud, receiving benefits, or gaining financially in some way.

Common Issues on Data Privacy PHISHING HACKING Involves activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. INDENTITY THEF A type of social engineering attack often used to seal user data, including login credentials and credit card numbers. Occurs when a criminal obtains or uses the personal information of someone else to assume their identity or access their accounts for the purpose of committing fraud, receiving benefits, or gaining financially in some way.

Common Issues on Data Privacy PHISHING HACKING Involves activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. INDENTITY THEF A type of social engineering attack often used to seal user data, including login credentials and credit card numbers. Occurs when a criminal obtains or uses the personal information of someone else to assume their identity or access their accounts for the purpose of committing fraud, receiving benefits, or gaining financially in some way.

Common Issues on Data Privacy PHISHING HACKING Involves activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. INDENTITY THEF A type of social engineering attack often used to seal user data, including login credentials and credit card numbers. Occurs when a criminal obtains or uses the personal information of someone else to assume their identity or access their accounts for the purpose of committing fraud, receiving benefits, or gaining financially in some way.

CYBERCRIME Also called computer crime; any criminal activity that involves the use of a computer, networked device, or a network as an instrument to further illegal ends.

CYBERBULLYING The use of digital means of communication that could hurt or harass a person such as intentionally sending hurtful text or SNS messages, posting embarrassing photos or videos, and spreading malicious rumors online.

Cybercrime Law The Cybercrime Prevention Act of 2012 (Republic Act No. 10175) covers all other online anomalies such as identity theft, child pornography, data misuse, cybersquatting and other computer-related and internet facilitated practices. This law became controversial in 2012-2013 since it also criminalizes libel in the online world, limiting certain exercises of freedom of expression.

Piracy Piracy refers to the unauthorized duplication of copyrighted content that is then sold at substantially lower prices in the black market. It is illegal under the Cybercrime Law, which states that acquiring any digital copy of any copyrighted material is punishable by fine from Php 200,000 to Php 500,000 and six to twenty years in prison.

FAKE INFORMATION News, stories, or hoaxes created to deliberately misinform or deceive readers and created to either influence people’s views, push a political agenda, or cause confusion and can often be a profitable business for online publishers

TYPES OF FAKE INFORMATION MANIPULATED CONTENT MISLEADING HEADLINES FALSE CONTEXT CLICKBAIT PROPAGANDA SATIRE/PARODY BIASED/SLANTED NEWS

Computer Addiction An overdependence or damaging need to do something on computer or internet; excessive use of computers to the extent that it interferes with daily life.

Triggers for Computer Addiction Computer games Online Shopping Social Media

Digital Divide The digital inequality or gap between groups in terms of knowledge, usage, an access to ICT due to circumstances like location, income and age.

Netiquette Defined as a set of rules for proper and acceptable online behavior; demotes the proper attitude that one should have and observed when communicating online

Core Rules of Netiquette (SHEA, 1994) 1. Remember the Human 2. Adhere to the same standards of behavior online that you follow in real life. 3. Know where you are in cyberspace 4. Respect other people’s time and bandwidth 5. Make yourself look good online 6. Share expert knowledge 7. Help keep flame wars under control 8. Respect other people’s privacy 9. Don’t abuse your power  

Lesson 8:   Opportunities, Challenges and Power of Media and Information

Opportunities Online Shopping Through online shopping and by using a web browser, consumers can directly buy goods over the internet. Consumers may visit the website of the retailer directly or search alternative vendors’ websites using a shopping search engine. Citizen Journalism A collection, dissemination, and analysis of news and information by the general public, especially by means of internet Online Education With internet connection, anyone can earn a degree without having to attend face-to-face class sessions.

Challenges Age-inappropriate content With the unabated spread of media, one has to be very careful about access. There is a wealth of information one can gain from the Internet, but there is also content that is unfit for children and young people like pornography and violence Illegal content T he Internet has also been, and continues to be, used by unscrupulous people to further their illegal activities, like human trafficking, the use o f force, force, fraud, or coercion to obtain a commercial sex act or labor, and child pornography. Some groups also use the internet to further the ideas of racism and discrimination. Privacy invasion and identity theft Data posted on the Internet may be accessed and used for illegal activities. Personal information may be willing shared as pictures or text on social media or inadvertently given by users as part of such offerings as games or surveys. It is important for users to be aware of the risks before they decide to share their personal data. .

Threats and Controversies on media and information Stereotyping the process of labeling an entire group according to the characteristics of some. Racial Discrimination disinformation and hate speech targeting diverse population segments. involves self-regulation by remembering and respecting one’s self, peers, sources, people involved in the news, towards the community where they operate. situations in which professional, personal and/or financial obligations or interests compete with the journalist’s responsibility to bis outlet and audience ( Peneberg , 2007) Accountability Censorship any attempt to limit suppress, or prevent the free exchange of information, ideas or artistic expression Conflict of Interest

Activity 2 What’s More Instruction: Using a separate sheet of paper, write an essay focusing on one of the following topics: Choose one topic only.   A. The Influence of Media on Violence B. Effects of Media on Socio-Economic Dimensions C. Role of Media in Crime Prevention

This output will be graded using this rubric Organization Style Convention Content Paragraph formation which includes introduction, body, and conclusion Choice, use and arrangement of words, and sentence structure Grammar, spelling, and sentence formation Presence of ideas developed through facts, details, and opinions. 20 points Advanced arrangement of content Precise use of a Variety of words and sentence structure to create consistent ideas No spelling, punctuation or grammatical errors Substantial and specific contents demonstrating sophisticated ideas 15 points Functional arrangement of content that sustains a logical order Limited word choice and control of sentence structure Few spelling and Punctuation errors, minor grammatical errors Limited content with inadequate explanation 10 points Minimal control of content arrangement Minimal control of word choice and sentence structure Many spelling, grammatical errors that interfere with the meaning Superficial and minimal content

THANK YOU!
Tags