Lesson 7: Legal, Ethical and Societal Issues in Media and Information Literacy
Objectives Identify the different issues in media and information literacy, common issues on data privacy and core rules of netiquette. Classify the opportunities, challenges and power of media and information. Create a poster and slogan about the power of media and information
Digital Citizenship Ability to find, access, use, and create information effectively; engage with other users and with content in an active, critical, sensitive and ethical manner; and navigate the online and ICT environment safely and responsibly, being aware of one’s own rights (UNESCO, 2016)
Issues in Media and Information Literacy
Intellectual Property Refers to the “creation of the mind such as inventions, literary and artistic works, designs, symbols, names, and images used in commerce”
Geographical indications and appellation of origin Industrial design Trademark Patent Fair Use Plagiarism Copyright Types of Intellectual Property
Geographical indications and appellation of origin Industrial design Trademark Patent Fair Use Plagiarism Copyright A legal term used to describe the rights that creators have over their literary and artistic works and give the creator the sole right to publish and sell that work .
Geographical indications and appellation of origin Industrial design Trademark Patent Fair Use Plagiarism Copyright An act or instance of using or closely imitating the language and thoughts of another author without authorization; the representation of that author’s work as one’s own, as by not crediting the original author.
Geographical indications and appellation of origin Industrial design Trademark Patent Fair Use Plagiarism Copyright A legal principle stating that one can use a copyrighted work without a license for the following purposes: commentary, criticism, reposting, research, and teaching
Geographical indications and appellation of origin Industrial design Trademark Patent Fair Use Plagiarism Copyright Exclusive right granted for an invention, which is a product or a process that provides, in general, a new way of doing something, or offers a new technical solution to a problem .
Geographical indications and appellation of origin Industrial design Trademark Patent Fair Use Plagiarism Copyright Distinguished sign of goods or services that identifies and differentiate from one enterprise to another; a signature work.
Geographical indications and appellation of origin Industrial design Trademark Patent Fair Use Plagiarism Copyright Protects only the appearance or aesthetic features of a product such as shape, surface, patterns, lines, or color .
Geographical indications and appellation of origin Industrial design Trademark Patent Fair Use Plagiarism Copyright Signs used on products possessing qualities, a status or characteristics that are essentially attributable to that location of origin
Common Issues on Data Privacy PHISHING HACKING Involves activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. INDENTITY THEF A type of social engineering attack often used to seal user data, including login credentials and credit card numbers. Occurs when a criminal obtains or uses the personal information of someone else to assume their identity or access their accounts for the purpose of committing fraud, receiving benefits, or gaining financially in some way.
Common Issues on Data Privacy PHISHING HACKING Involves activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. INDENTITY THEF A type of social engineering attack often used to seal user data, including login credentials and credit card numbers. Occurs when a criminal obtains or uses the personal information of someone else to assume their identity or access their accounts for the purpose of committing fraud, receiving benefits, or gaining financially in some way.
Common Issues on Data Privacy PHISHING HACKING Involves activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. INDENTITY THEF A type of social engineering attack often used to seal user data, including login credentials and credit card numbers. Occurs when a criminal obtains or uses the personal information of someone else to assume their identity or access their accounts for the purpose of committing fraud, receiving benefits, or gaining financially in some way.
Common Issues on Data Privacy PHISHING HACKING Involves activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. INDENTITY THEF A type of social engineering attack often used to seal user data, including login credentials and credit card numbers. Occurs when a criminal obtains or uses the personal information of someone else to assume their identity or access their accounts for the purpose of committing fraud, receiving benefits, or gaining financially in some way.
CYBERCRIME Also called computer crime; any criminal activity that involves the use of a computer, networked device, or a network as an instrument to further illegal ends.
CYBERBULLYING The use of digital means of communication that could hurt or harass a person such as intentionally sending hurtful text or SNS messages, posting embarrassing photos or videos, and spreading malicious rumors online.
Cybercrime Law The Cybercrime Prevention Act of 2012 (Republic Act No. 10175) covers all other online anomalies such as identity theft, child pornography, data misuse, cybersquatting and other computer-related and internet facilitated practices. This law became controversial in 2012-2013 since it also criminalizes libel in the online world, limiting certain exercises of freedom of expression.
Piracy Piracy refers to the unauthorized duplication of copyrighted content that is then sold at substantially lower prices in the black market. It is illegal under the Cybercrime Law, which states that acquiring any digital copy of any copyrighted material is punishable by fine from Php 200,000 to Php 500,000 and six to twenty years in prison.
FAKE INFORMATION News, stories, or hoaxes created to deliberately misinform or deceive readers and created to either influence people’s views, push a political agenda, or cause confusion and can often be a profitable business for online publishers
TYPES OF FAKE INFORMATION MANIPULATED CONTENT MISLEADING HEADLINES FALSE CONTEXT CLICKBAIT PROPAGANDA SATIRE/PARODY BIASED/SLANTED NEWS
Computer Addiction An overdependence or damaging need to do something on computer or internet; excessive use of computers to the extent that it interferes with daily life.
Triggers for Computer Addiction Computer games Online Shopping Social Media
Digital Divide The digital inequality or gap between groups in terms of knowledge, usage, an access to ICT due to circumstances like location, income and age.
Netiquette Defined as a set of rules for proper and acceptable online behavior; demotes the proper attitude that one should have and observed when communicating online
Core Rules of Netiquette (SHEA, 1994) 1. Remember the Human 2. Adhere to the same standards of behavior online that you follow in real life. 3. Know where you are in cyberspace 4. Respect other people’s time and bandwidth 5. Make yourself look good online 6. Share expert knowledge 7. Help keep flame wars under control 8. Respect other people’s privacy 9. Don’t abuse your power
Lesson 8: Opportunities, Challenges and Power of Media and Information
Opportunities Online Shopping Through online shopping and by using a web browser, consumers can directly buy goods over the internet. Consumers may visit the website of the retailer directly or search alternative vendors’ websites using a shopping search engine. Citizen Journalism A collection, dissemination, and analysis of news and information by the general public, especially by means of internet Online Education With internet connection, anyone can earn a degree without having to attend face-to-face class sessions.
Challenges Age-inappropriate content With the unabated spread of media, one has to be very careful about access. There is a wealth of information one can gain from the Internet, but there is also content that is unfit for children and young people like pornography and violence Illegal content T he Internet has also been, and continues to be, used by unscrupulous people to further their illegal activities, like human trafficking, the use o f force, force, fraud, or coercion to obtain a commercial sex act or labor, and child pornography. Some groups also use the internet to further the ideas of racism and discrimination. Privacy invasion and identity theft Data posted on the Internet may be accessed and used for illegal activities. Personal information may be willing shared as pictures or text on social media or inadvertently given by users as part of such offerings as games or surveys. It is important for users to be aware of the risks before they decide to share their personal data. .
Threats and Controversies on media and information Stereotyping the process of labeling an entire group according to the characteristics of some. Racial Discrimination disinformation and hate speech targeting diverse population segments. involves self-regulation by remembering and respecting one’s self, peers, sources, people involved in the news, towards the community where they operate. situations in which professional, personal and/or financial obligations or interests compete with the journalist’s responsibility to bis outlet and audience ( Peneberg , 2007) Accountability Censorship any attempt to limit suppress, or prevent the free exchange of information, ideas or artistic expression Conflict of Interest
Activity 2 What’s More Instruction: Using a separate sheet of paper, write an essay focusing on one of the following topics: Choose one topic only. A. The Influence of Media on Violence B. Effects of Media on Socio-Economic Dimensions C. Role of Media in Crime Prevention
This output will be graded using this rubric Organization Style Convention Content Paragraph formation which includes introduction, body, and conclusion Choice, use and arrangement of words, and sentence structure Grammar, spelling, and sentence formation Presence of ideas developed through facts, details, and opinions. 20 points Advanced arrangement of content Precise use of a Variety of words and sentence structure to create consistent ideas No spelling, punctuation or grammatical errors Substantial and specific contents demonstrating sophisticated ideas 15 points Functional arrangement of content that sustains a logical order Limited word choice and control of sentence structure Few spelling and Punctuation errors, minor grammatical errors Limited content with inadequate explanation 10 points Minimal control of content arrangement Minimal control of word choice and sentence structure Many spelling, grammatical errors that interfere with the meaning Superficial and minimal content