50% found this document useful (2 votes)
2K views26 pages

Media and Information Literacy: Quarter 1 - Module 7 - 8

Uploaded by

Rodge Cancino
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
50% found this document useful (2 votes)
2K views26 pages

Media and Information Literacy: Quarter 1 - Module 7 - 8

Uploaded by

Rodge Cancino
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

SENIOR HIGH SCHOOL

Media and Information


Literacy
Quarter 1 – Module 7 - 8:
Module 7: LEGAL, ETHICAL & SOCIETAL ISSUES IN
MEDIA AND INFORMATION
Module 8: OPPORTUNITIES, CHALLENGES & POWER
OF MEDIA AND INFORMATION

1
What I Need to Know

This module was designed and written with you in mind. It is here to help
you master the context of Media and Information Literacy. It contains varied
activities that can help you as a Senior High School student to not just be an
information literate individual, but a creative and critical thinker as well as
responsible user and competent producer of media and information.
The module contains lesson in Legal, Ethical, Societal Issues in Media and
Information.

After going through this module, you are expected to:


1. Put into practice your understanding of the intellectual property, copy
right, and fair use guidelines
2. Cite practical situation when to apply knowledge in intellectual property,
copy right, and fair use guidelines.

MIL LEGAL, ETHICAL & SOCIETAL ISSUES


IN MEDIA AND INFORMATION

What’s In

In previous lesson was about Media and Information Languages. The lesson
discusses the Media Languages, Codes, Conventions, and Messages, Audiences,
Procedures and Other stakeholders. In codes or conventions, you have to follow
standards like traffic signs if green means go then if it red meaning stop.

The next lesson we will tackling copyright, fair use, and plagiarism for
another standard to be followed.

2
What’s New

Activity 1: Complete Me. The following terms are all associated with ethical use
of media and information, before you proceed, try to figure out what these terms.
1. C___R_G_
2. C_MM__ S
3. P_ TE__
4. _A_R U__
5. F_AM__G
6. __BE_ __LL___G
7. __AG__R__M
8. _E__QU___E

What is It

What is copyright?
Copyright is mainly the protection of one’s expressions which only becomes
tangible and concepts when objects are created as manifestation of these
expression. Copyright could be a variety of protection provided by the laws to the
authors of “original works of authorship,” together with literary, dramatic,
musical, artistic, and bound different intellectual works. This protection is
obtainable to each revealed and unpublished works.
• Set of rights granted the author
• Creator of a piece, to limit others ability to repeat
• Redistribute and reshape the content.

Related Issues
A copyright protects solely original works of “authorship” enclosed within
the following seven categories:
• Literary works (including pc programs),
• Musical works, together with any incidental words,
• Dramatic works, together with any incidental music,
• Pantomimes and dance works,
• Pictorial, graphic, and sculptural works, • Motion photos and different
audiovisual works,
• Sound recordings.

3
Registering Copyright
Majority of the state signatories of WIPO adhere to the Berne convention
that provides automatic copyright protection. This means that a registration or any
other formality is not required. As for most countries, including the Philippine,
there is a system for voluntary registration of works. Such system “help solve
disputes over ownership or creation, as well as facilitate financial transactions,
sales, and the assignment and/or transfer of rights.”

Fair Use
Fair Use is the limitation and to the prerogative granted by copyright law to
the author of an ingenious work. samples of use embrace statement, search
engines, criticism, news coverage, research, teaching, library archiving and
scholarship.

Plagiarism
The plagiarism is copying or closely imitating the work of another author,
composer, etc., while no permission and with the intention of passing the results
of as original.

What is netiquette?
Netiquette refers to a collection of rules that governs what conduct is socially
acceptable in a web or digital scenario. It’s a social code of network
communication. Netiquette is a set of rules for behaving properly on-line. It
represents the importance of correct manners and behavior on-line. In general,
netiquette is that the set of skilled and social etiquettes practiced and advocated in
transmission over any electronic network. Common pointers embody being
courteous and precise, and avoiding cyber-bullying.

Netiquette additionally dictates that users ought to adapt copyright laws and
avoid over victimization emoticons. It could be a short type of network rule or net
rule. The word netiquette could be a combination of ‘net’ (from internet) and
‘etiquette’. It suggests that respecting alternative users’ views and displaying
common courtesy once posting your views to on-line discussion teams.

10 Basic Rules of Netiquette or Internet Etiquette


Know your manners when using Technology. The rules of etiquette are just
as important in cyberspace as they are in the evidence of poor netiquette can stick
around to haunt you for much longer. Follow these basic rules of netiquette to
avoid damaging your online and offline relationships.

4
DO DON’T
- Respect other people’s - Name-call or express offensive opinions Post
- privacy Verify facts before - private or embarrassing images or comments
- reposting Check messages - Exclude people or talk behind their backs.
and respond promptly

1. Remember That Real People Take Priority


If someone is in the room with you, stop what you are doing and look at
them. And don’t answer your cellphone unless it is to tell the person on the other
end that you will call them right back. If you are expecting an important call or
email, let the person know upfront, and apologize for taking the call. This is also
true of public places, such as restaurants, public transit, stores, and libraries. Avoid
taking phone calls and having conversations in these shared spaces.

2. If You Wouldn’t Say It to Someone’s Face, Don’t Say It Online


Name-calling, cursing, expressing deliberately offensive opinions – if you
wouldn’t do it to the face of anyone who might conceivably see what you write,
don’t write it. This goes for any social media site, forum, chat room, or email
message, even if you think it can’t be traced back to you.

3. If You Wouldn’t Show it in Public, Don’t Share It Online


Naked sex pictures, drunk pictures, drug use pictures, unedited home video
- if you would have a problem with your boss, your parents, or your kids seeing it
now, or at any point in the future, don’t post it online.

4. Don’t Exclude Your Audience


If you have an in-joke to share with one other person, or a small number of
people in a larger online group, send them a private message. Don’t make everyone
else feel left out by posting an obscure comment to your Facebook status, forum,
or Instagram story.

5. Don’t “Friend” Then “Unfriend” People


NO one believes you have 1,000 friends, but it is insulting to be dropped
from someone’s friend list. Think about it before adding them or accepting their
invitation. If you don’t want to be in touch with them, don’t add them in the first
place. If you want to stay in touch for professional reasons, tell them you only use
Facebook for close personal friendships, and join LinkedIn or another professional
networking site for more distant contacts.

5
6. Don’t Overload System Resources With Enormous Files
You might think that sequence of nature pictures with inspirational
statements is wonderfully moving. It might even give you a sense of serenity. But
that is the last thing it will give the person you email it to if it crashes their server,
depletes their inbox quota so their emails get bounced for a week before they
realize, or uses up the last bit of space they needed to complete an important
assignment. So post it to your own space and send people a link. Don’t attached it
to an email.

7. Respect People’s Privacy


Don’t forward information sent to you without checking with the original
sender first. Use BCC (blind carbon copy) rather than CC (Carbon Copy) if you
are sending something out to more than one person. You might think that we are
sending online, but your friends may not want their names and or email addresses
publicized to people they do not even know.

8. Don’t Repost Without Checking the Facts


That cure for cancer might sound pretty impressive, but it will cause upset if
it is a hoax. And urban myths add to the noise of the internet and waste people’s
time. If you aren’t sure of the facts, email it to someone who does know or can
find out. Or do a search on Google or snopes.com.

9. Check and Respond to Email Promptly


By all means, ignore and delete spam, unsolicited messages, and crazy stuff.
But if you have given someone your email address or if you are in a position where
people could reasonably be expected to contact you by email and your email
address is public, have the courtesy to reply to their message within a few days. If
it is going to take longer to reply, email them and tell them that.

10. Update Online Information That People Depend Upon


Don’t leave inaccurate information online just because you can’t be bothered
to update your website. If you are going to be unavailable, for example, don’t leave
your hours of operation online indicating you will be available. If you can’t keep
your website up to date, take it down.
DIGITAL DIVIDE, ADDICTION, BULLYING

Digital Divide
Digital divide could be a term that refers to the gap between demographics
and regions that have access to trendy info and technology, and people that do not
or have restricted access. Before the late twentieth century, digital divide referred
principally to the division between those with and without phone access.
6
The digital divide generally exists between those in cities and people in rural
areas; between the educated and the uneducated; between socioeconomic groups;
and, globally, between the more and less industrially developed nations. Even
among populations with some access to technology, the digital divide can be
evident in the form of lower-performance computers, lower-speed wireless
connections, lower priced connections such as dial-up, and limited access to
subscription-based content (Rouse, 2014).

Computer Addiction
A disorder in which the individual turns to the Internet or plays computer
games to change moods, overcome anxiety, deal with depression, reduce isolation
or loneliness, or distract themselves from overwhelming problems. The elderly, as
well as children and adolescents, are particularly vulnerable because they may not
realize the extent of their dependency. In many instances, individuals with
computer addiction may seek help for another condition, such as depression,
phobias or other addictions (Shiel, 2018).

Bullying
Stopbullying.org (2019) defines bullying as unwanted, aggressive behavior
among school aged children that involves a real or perceived power imbalance.
The behavior is repeated, or has the potential to be repeated, over time. Both kids
who are bullied and who bully others may have serious, lasting problems.
In order to be considered bullying, the behavior must be aggressive and
include:
• An Imbalance of Power: Kids who bully use their power—such as physical
strength, access to embarrassing information, or popularity—to control or
harm others. Power imbalances can change over time and in different
situations, even if they involve the same people.
• Repetition: Bullying behaviors happen more than once or have the potential
to happen more than once.
Bullying includes actions such as making threats, spreading rumors,
attacking someone physically or verbally, and excluding someone from a group
on purpose.

Three Types of Bullying


• Verbal bullying is saying or writing means things. Verbal bullying includes:
Examples: - Teasing
- Name-calling
- Inappropriate sexual comments
- Taunting,
- Threatening to cause harm.
7
• Social bullying, sometimes referred to as relational bullying, involves hurting
someone’s reputation or relationships. Social bullying includes:
Examples:
- Leaving someone out on purpose
- Telling other children not to be friends with someone
- Spreading rumors about someone
- Embarrassing someone in public
• Physical bullying involves hurting a person’s body or possessions.
Physical bullying includes:
- Hitting/kicking/pinching
- Spitting
- Tripping/pushing
- Taking or breaking someone’s things
- Making mean or rude hand gestures

Intellectual Property in International and Local Context


Intellectual property, or IP, as defined by the World Intellectual Property
Organization (WIPO), is the “creation of the mind, such as inventions, literary and
artistic works, designs and symbols, names and images used in commerce.” Since
the products of human intellect have a direct influence on human civilization and
on the development of societies, there should be safeguards on intellectual
property.

Laws are enacted to enforce and recognition toward the fruits of other
people’s ingenuity. Inventions or creations serve some benefits to user, thus in the
logic of commerce of business, inventions and creators should be properly
compensated for their contribution. If their intellectual property right is protected,
people will be motivated to contribute more by continuously inventing and
creating for the public good on the spirit of fair play.

The WIPO is the “global forum for intellectual property service, policy,
information, and cooperation.” In the Convention Establishing the World
Intellectual Property Organization signed at Stockholm on 14 July 1967 and
amended on 28 September 1979, it has been agreed among the state signatories
that the WIPO will be “responsible for the promotion and protection of intellectual
property throughout the world through cooperation among state and, where
appropriate, in collaboration with other international organizations, and for the
administration of various treaties dealing with intellectual property rights,” WIPO
has classified the forms of IP .

8
Table 1. Types of Intellectual Property
Terms Description Coverage
• Legal terms used to describe • Books, Music, Paintings,
Copyright the rights that creators have Sculpture, Films, Computer
over their literary and artistic program, Databases,
works Advertisement, Maps,
Technical drawings
Provides the patent owner with • Exclusive right granted for
Patent the right to diced how, or an invention
whether, the invention can be
used by others in exchange for
this right. The patent owner
makes technical information
about the invention publicly
available in the published
patent document
Trademark • A sign capable of • Products sold or services
distinguishing goods or offered by a business entity
services of one enterprise from
those of other enterprises
• Dates back to ancient times
when craftsmen used to put
their signature or “mark” on
their products
Industrial • Constitutes the ornamental or • Design of an object (shape
Design aesthetic aspect of an or surface, patterns, lines, or
article/object colors)
Geographical • Sign used on goods that have • The name of the place of
Indication specific geographical origin origin of the goods/products
and and possess qualities, a
Appellation reputation or characteristics
of Origin that are essentially attributable
to that place of origin

The Intellectual Property Law of the Philippines


The Philippines, as a State signatory in the Convention Establishing the
World Intellectual Property Organization, is duty-bound to pass a law on
intellectual property protection. Thus, the enactment of Republic Act 8293,
otherwise known as “The Intellectual Property Code of 1997”.

9
According to this piece of legislation, intellectual property rights consist of:
1. Copyright and related rights;
2. Trademarks and service marks;
3. Geographic indication;
4. Industrial designs;
5. Patents;
6. Layout-designs {Topographies) of integrated circuits; and
7. Protection of understanding information.

Copyright Protected Works


Under Philippine copyright, both original works and derivative works are
protected.
Original works are those that are literary or artistic in natures which include
the following:
• Books, pamphlets, article, and other writings
• Periodicals and newspapers
• Lectures, sermons, addresses, dissertation prepared for oral delivery, whether
or not reduced in writing or other material form
• Letters
• Dramatic or dramatic-musical compositions; choreographic works or
entertainment in dumb show
• Musical compositions, with or without words
• Works of drawing, painting, architecture, sculpture, engraving, lithography or
other works of art; models or designs for works of art
• Original ornamental designs or models for articles of manufacture, whether or
not registrable as an industrial design, and other works of applied art
• Illustration, maps, plans, sketches, chart and three-dimensional works relative
to geography, topography, architecture or science
• Drawings or plastic works of scientific or technical character
• Photographic works including work produced by a process analogous to
photography; lantern sides
• Audiovisual works and cinematographic works and works produced by a
process analogous to cinematography or any process of making audio-visual
recordings;
• Pictorial illustrations and advertisements
• Computer programs
• Other literary, scholarly, scientific and artistic works

Works Not Protected


There are also works that are not covered by copyright due to insufficient
authorship or due to the work being of importance to public interest.

10
1. Unprotected Subject Matter
• Any idea, produce, system, method or operation, concept, principle,
discovery or mere data as such, even if they are expressed, explained,
illustrated or embodied in a mark
• News of the day and other miscellaneous facts having the character of mere
items of press information
• Any official text of a legislative, administrative or legal nature, as well as
any official translation.

2. Works of the Government


• Any purpose of statutes, rules and regulations, and speeches, lectures,
sermons, addresses, and dissertations, pronounced, read or rendered in courts
of justice, before administrative agencies, in deliberative assembles and in
meeting of public character. (Sec. 9, first par., P.D. No. 49)

What’s More

ACTIVITY 3
a. In 100 words or more, explain the value of intellectual property especially in
the case of media content or products.
b. What is the main difference between copyright and patent?
c. Do you think technology and internet have made plagiarism easier? Do you
think technology has made people more or less creative? Explain your
answer with examples.

What I Can Do

1. Cite one example in your school or community of teenagers who have


experienced computer addiction. What happen them? Have they recovered
from their addiction?

2. Give one suggestion to avoid cyber bullying. Give one suggestion to avoid
being a cyberbully.

11
Assessment
A. Matching Type: Match column A with column B, write only the letter of your
correct answer in your notebook or notebook.
Column A Column B

1. Copying or closely imitating the work of another author, A. Copyright


composer, etc., while no permission and with the intention of
passing the results off as original. B. Laptop Addiction
2. A legal device that provides the creator of a literary, artistic,
musical, or different inventive work the only real right to C. Cyber Bullying
publish and sell that job.
3. A type of bullying that takes place on-line, or victimization D. Fair Use
electronic technology like cell phones, computers, and tablets
over communication tools E. Plagiarism
4. The excessive use of computers to the extent that it interferes
with standard of living, particularly in using technological F. Bullying
device.
5. Refers to the limitation and to the prerogative granted by G. Netiquette
copyright law to the author of an ingenious work.
6. A term referring to the gap between demographics and regions H. Physical Bullying
that have access to trendy info and technology, and people that
do not or have restricted access. I. Patent
7. A type of bullying that involves hurting a person’s body or
possessions. J. Digital Divide
8. A set of rules for behaving properly on-line.
K. Cybercrime
9. Exclusive right granted for an invention.
10. The unwanted, aggressive behavior among school aged
children that involves a real or perceived power imbalance.

B. True or False. Write True if the statement is correct, False if it is incorrect. Write
the answer on your notebook or answer sheet.
__________ 1. A copyright protects solely original works of “authorship” like literacy
works and sound recording.
__________ 2. Algorithm is a collection of rules that governs what conduct is socially
acceptable in a web or digital scenario.
__________ 3. In the internet always remember that real people take priority.
__________ 4. Never post private or embarrassing images or comments in social media.
__________ 5. Computer addiction is a disorder in which individual turns to the Internet
or plays computer games to change moods, overcome anxiety, deal with
depression, reduce isolation or loneliness, or distract themselves from
overwhelming problems.
12
Additional Activity

Reflection:
1. What are the basic rules in protecting yourself online?

REFERENCES

BOOKS
Liquigan, Boots C. Media and Information Literacy. Philippine: DIWA Learning System Inc., 2016

Zarate, Jovita E. Media and Information Literacy. 1st ed. Philippine: Rex Book Store, Inc. 2016

WEB SITES
GCFGlobal:GCFLearnFree.org. “Internet Basics”.
https://edu.gcfglobal.org/en/internetbasics/ (accessed 21 June 2020)

Dwyer, “David Top 12 Best Search Engines in the World”,


https://www.inspire.scot/blog/2016/11/11/top-12-best-search-engines-inthe-world238 (Accessed 21
June 2020)

“Media Convergence: Opportunities and Challenges.”


https://mconvergence.wordpress.com/2011/12/12/media-convergenceopportunities-ans-challenges/
(accessed 21 June 2020)

https://www.colorado.edu/ecenter/sites/default/files/styles/large_square_thumb
nail/public/callout/newspapers_magazines_and_books.jpg?itok=y_8Lr7dR (Accessed 11 August 2020)
https://iupui.libguides.com/longDesc/typesOfSources (Accessed 21 June 2020)

https://tribune.net.ph/index.php/2019/01/04/cebu-public-library-to-go-digital/ (Accessed 21 June 2020

13
SENIOR HIGH SCHOOL

Media and Information


Literacy
Quarter 1 – Module 8:
OPPORTUNITIES, CHALLENGES &
POWER OF MEDIA AND INFORMATION

14
What I Need to Know
This module was designed and written with you in mind. It is here to help
you master the context of Media and Information Literacy. It contains varied
activities that can help you as a Senior High School student to not just be an
information literate individual, but a creative and critical thinker as well as
responsible user and competent producer of media and information.

The module contains lesson in Opportunities, Challenges, Power of Media


and Information.

After going through this module, you are expected to:


1. Realize opportunities and challenges in media and information,
2. Cite an example of an issue showing the power of media and information
to affect change. (MELC)

MIL OPPORTUNITIES, CHALLENGES &


POWER OF MEDIA AND INFORMATION

What’s In

Humans continue to survive because of their ability to create or invent


technology furthering the preservation of the species. Of course, this presumption
may be debated on again and again in different fields and disciplines. But one
thing is apparent-humans are able to create because of their ability to think.

What’s New

Activity 1: Based on your experiences, draw a diagram that illustrates your prior
knowledge of opportunities, challenges, and power of social media and
information in your daily life.

15
What is It

Media and Information Improve Quality of Life


There is no denying the extent of how the media
and information age has drastically improved the
lives of people. Communication has been made
easier. Information has become widely accessible.
Conducting research has become more convenient.
All these and more are enjoyed by media literate
individuals and prove just how much the quality of
life has improved thanks to media and information.
According to Time Berners-Lee “It’s time to recognize the internet as a basic
human right. This means guaranteeing affordable access for all, ensuring internet
packets are delivered without commercial or political discrimination, and
protecting the privacy and freedom of web users regardless of where they live.”

The Impact of World Wide Web

Sir Tim Berners-Lee changed the world: he


invented the World Wide Web. He then gave the
web to all of us for free – a move that sparked a
global wave of creativity, collaboration and
innovation never seen before. The web has changed
the world, but that free and open web is today under
threat.
Tim Berners-Lee created a web for everyone, a
level playing field where anyone, anywhere who
could access the internet could also use the web to learn, earn, create and dream
without asking for permission. But he knew this vision needed to be protected, so
he founded the World Wide Web Foundation to defend and advance the open web
as a public good and a basic right.

The Rise of Social Network Sites on the Internet


Social networks are one of the fastest growing industries in the world. Since
2002 (creation of Friendster, prior to Facebook) a new socio-technical revolution
has taken place on the Internet: the rise of social network sites where now all
human activities are present, from personal interaction to business, to work, to
culture, to communication, to social movements, and to politics.

16
Our society is a network society; that is, a society constructed around
personal and organizational networks powered by digital networks and
communicated by the Internet. And because networks are global and know no
boundaries, the network society is a global network society. This historically
specific social structure resulted from the interaction between the emerging
technological paradigm based on the digital revolution and some major
sociocultural changes. A primary dimension of these changes is what has been
labeled the rise of the Mecentered society, or, in sociological terms, the process
of individuation, the decline of community understood in terms of space, work,
family, and ascription in general.
This is not the end of community, and not the end of place-based interaction,
but there is a shift toward the reconstruction of social relationships, including
strong cultural and personal ties that could be considered a form of community,
on the basis of individual interests, values, and projects.
Opportunities, Challenges and Power of Media and Information
Opportunities Challenges Power
• Job Hiring • Fake News • Influence
• Empower Citizen • Unreliable • Distribution of
• Freedom of expression sources information
• Informing & keeping the mass up to date
• Inspire
• Faster and free communication

17
▪ Opportunity. A time or set of circumstances that makes it possible to do
something.
▪ Challenge. A challenge is something new and difficult which requires great
effort and determination.
▪ Power. When you heard the word “POWER”. For most of you, perhaps, the
word “control”. “Domination”, and “Influence” will immediately come to
mind. According to Weber (1946) power is often related to our ability to
make others do what we want, regardless of their own wishes or interests.
▪ Empowerment. It is the idea of power and idea that power change, that the
ownership of power can shift from one entity to another. Empowerment can
is possible because power can expand or diminish as the case may be.

1. Economics of media: Ratings and Revenues


The economics of media can be explained in the simple equation Ratings=
Revenues. As a commercial industry, the media earns profit through
advertisement. Advertisers pay for air-time or ad-space in media platforms to
reach or to promote their goods or services to the media’s audience. Advertisers
are more likely to invest if there is a high volume of consumers patronizing the
media programs or content or if their target market is among those consumers.

▪ Ratings. Is a colloquial term for audience measurement that influence


timing, placements, and markets for media content and advertising.
(Balnaves, O’Regan, & Goldsmith, 2011) Ratings determine the number of
people who watches, listens to or reads a particular content.
▪ Revenues. The business dictionary defines revenue as income generated
from the sale of goods or services, or any other use of capital or assets,
associated with the main operations of an organization before any costs or
expenses are deducted.
▪ The Opportunity. The Philippine media is a great asset in the country’s
economy. In fact, the Philippines Star reported that in the year 2010 alone,
the creative or copyright-based industries contributed P661.23 billion to the
Philippines economy.
▪ The Challenges. Despite thriving as an industry, the media remains
vulnerable to economic threats. The most notorious among them is privacy.
Privacy is defined as the unauthorized use of another’s production,
invention, or conception especially in infringement of copyright by the
Merriam Webster’s Dictionary.

18
The existence of cheap or even free digital technologies like torrent
downloading makes piracy even more attractive to consumers.

2. Media and Information for Education


Media and information have made a radical impact in education. Learning
has never been easier and at the same time more complicated than it is today in the
age of media and information.

▪ The Opportunity. Merriam-Webster’s dictionary defines education as the


knowledge, skill, and understanding that you get from attending a school,
college, or university. Today, education has taken whole new meaning with
media and information.
▪ Online education is now a fast-becoming trend in society. Schools and
universities are adopting this practice as part of their offered services.
Everyone with access to the internet need not physically attend a class to get
an education. This setup is popular among those who wish to further their
education but do not have the time or energy to deal with regular school.
With media and information, one can earn a degree from the comfort of their
homes.
Education traditionally requires a student to prove that learning took
place. To do so, one must be able to pass exam that will test their knowledge
on a certain subject and produce outputs that will confirm if they can apply that
knowledge. Media information makes this process a little less rigorous through
content contribution. By allowing people to share their knowledge online for
others to see, the network of experts can check and balance each other’s
understanding of subjects, therefore refining learning through interaction.
The convenience, abundance, and interconnection, aspects of media and
information for education are opportunities worth taking advantage of.

▪ The Challenge. In education, the opportunities brought about by media and


information is also to be blamed for its many challenges. Not only does this
promote laziness, constant access also puts a lot of pressure on servers,
requiring constant upgrades and regular maintenance around cyberspace.
The overwhelming amount of content to but found online requires the
tedious process of sorting through unnecessary or unrelated content to one’s
research. As challenging as it may be, it is necessary. Allowing anyone with
access to the internet to contribute to the network of information raises
credibility and authenticity issues.

19
3. Media and Information for Social Science
The society is heavily influenced by media and information. It is no surprise
then that media and information have been linked to social changes. Oxford
bibliographies referred to the social change as a significant alteration of social
structure.
▪ The Opportunity. Among the first to realize the possible positive
applications of the media and society’s co-dependent relationships were
Daniel Lerner and Wilbur Schramm. In their perspective works, The Passing
of Traditional Society (1958) and Mass Media and National Development
(1964) served as the founding texts of development communication
according to University of Pennsylvania (UPenn). Development
communication uses communication to aid in the development of society.
One practical application of this is community-based media programs.
Through information dissemination, promotion of development advocacies,
and providing a medium for social interaction among communities, these
types of programs pave the way for a positive social change.
▪ The Challenge. Media and information have the power to sway society’s
beliefs and perception. People have the tendency to receive data from the
media and accept it as fact right away without conducting due diligence.

4. Effect of Media in Politics


Politics regulates the media industry. They enforce the rules and regulations
governing the media industry as prescribed in a country’s current political system.
It is for this reason that the nature of media varies from country to country.
▪ The Opportunity. The interrelationship between media and politics
provides a fair foundation in nth function of media as a source of
information. Provisions in the law like the Freedom of Information Bill
which mandates the release of public documents to those who require it
benefits the media in their access to information and the government in its
war against corruption (The Official Gazette).
▪ The Challenge. As a developing country, the governments concentrate on
solving problems like poverty, unemployment, lack of proper healthcare,
and access to education.
The shortage of government funding, not to mention the lack of projects
and programs, that help cultivate creativity – which is the core of media –
prevent the media industry in reaching its potential for success. Even the weak
enforcement of certain laws to protecting the media exposes them to threats
that could have damaging repercussions on the industry.

20
Some Opportunities
Television Broadcaster. A television presenter presents information relating to
subjects such as news and sports, and may also be responsible for planning the
creative content of a series. Such experts will work with news programs and help
to discuss important topics in reporting, as well as provide comments on various
events.
They might also formulate interview questions, read scripts, and reveal
details about the show, such as commercial breaks. Example: TV broadcasting.
Mobile Communication. A means of technology mediated communication that
allows the user of a mobile device to connect with someone else at a different
location, such as texting from a cell phone and sending email from a computer
device equipped with WiFi (e.g. laptop, iPad).
A mobile phone is a wireless portable device that allows users, to make and
receive calls, and send text messages. The first mobile phone generation would
only be able to make and receive calls. Today’s mobile phones are packed with
many additional features like web browsers, games, cameras, video players and
even navigation systems.
Through media, people now a day’s can easily catch up news and be updated
because of television broadcaster. In the other side, mobile communication can
make our life easier. No need to write a letter if you want to ask allowance to your
mom instead just text and call. How amazing isn’t?
Some Challenges
Cybercrime. is defined as a crime in which a computer is the object of the crime
(hacking, phishing, spamming) or is used as a tool to commit an offense (child
pornography, hate crimes). Cybercriminals may use computer technology to
access personal information, business trade secrets or use the internet for
exploitative or malicious purposes.
Here are the Four Types of Cybercrime:
1. Hacking is the most common type of cybercrime committed across the world.
Hacking is a crime which entails cracking systems and gaining unauthorized
access to the data stored in them. Hacker is a person who breaks in to a computer
system.
2. Cyber stalking is use of internet or other electronic means to stalk someone.
It is online harassment and online abuse. Mostly cyber stalking involves
following a person’s movement across the internet by posting threatening
messages to the victim or by entering the chat rooms frequented by the victim
or by constantly bombarding the victim with the e-mails etc.

21
3. Virus dissemination. Virus is the programs which attach themselves to the
computer or file and then circulate themselves to other files and to other
components on a network. They usually affect the data on the computer, either
by altering or deleting it.

4. E-mail Spoofing. An e-mail that appears to originate from one source but
actually has been sent from another source. This can also be termed as e-mail
forging.

Phishing. It is a cybercrime in which a target or targets are contacted by email,


telephone or text message by someone posing as a legitimate institution to lure
individuals into providing sensitive data such as personally identifiable
information, banking and credit card details, and passwords.

After you read about the two challenges, let us dig deeper what makes
phishing and cybercrime a challenge in media and information.

Phishing is an illegal action or crime. Where in the hacker will hack or get
all your information’s over the internet. For example, your bank account details,
your personal information’s and even your credit card details. So, for you to be
safe in phishing avoid posting your personal information’s over the internet.

Always remember, your personal information’s are always confidential. No


sharing and posting personal information’s over the internet.
In the Philippines according to the Department of Justice, Cybercrime is “a
crime committed with or through the use of information and communication
technologies such as radio, television, cellular phone, computer and network, and
other communication device or application.

According to the 2001 Budapest Convention on Cybercrime, criminal


offenses in cyberspace include:
1. Offenses against the confidentiality, integrity, and availability of
computer data and systems;
2. Computer-related offenses;
3. Content-related offenses; and
4. Offenses related to infringements of copyright and related rights.

22
Below are cybercrime-related laws in the Philippines:
• Republic Act No. 10175 – Cybercrime Prevention Act of 2012
• Republic Act No. 9995 – Anti-photo Voyeurism Act of 2009
• Republic Act No. 9775 – Anti-child Pornography Act of 2009
• Republic Act No. 9208 – Anti-trafficking in Persons Act of 2003
• Republic Act No. 8792 – E-commerce Act of 2000
• Republic Act No. 8484 – Access Device Regulation Act of 1998; and
• Republic Act No. 4200 – Anti-wiretapping Law.

The Power of Media and Information


Student. The power of media and information in the side of the students is that,
nowadays the information is easy to get. Example, if you have assignments
you can use your phone to search information.
Business. While in business, the power of media and information is very strong.
Using media, the business owner can easily market their products. For
example, posting your products over the internet like in social media.
Society. The power of media and information in our society is huge. Through
media, the society can easily get and understand the information related to
what is happening.
Media has a particular power over audiences that media scholars call the
third-person effect. This is effect that can make you think that media messages
affect others but not you. This can happen because you are made to think that
media content may be too banal or simple to have any effect on you. You have to
remember three basic principles about media effects (Potter, 2011):
1. Media effects are constantly occurring because of media’s content and
direct/indirect influence on you;
2. Media work with other factors… in exerting influence, and
3. You can control the effects process in your life.

What’s More

Information Processing Tasks (Potter, 2011)


TASK GOAL FOCUS
Filtering To make decisions about To attend to only those Messages in the
Message which messages to filter message that have some environment.
out (ignore) and which to kind of usefulness for the
filter in (pay attention to) person and ignore all other
messages.

23
Meaning To use basic To access previously Referents in
Matching competencies to recognize learned meanings messages.
referents and locate efficiently
previously learned
definitions for each
Meaning To use skills in order to To interpret messages from One’s own
Construction move beyond meaning more than one perspective as knowledge
matching and to construct a means of identifying the structures.
meaning for one’s self in range of meaning options,
order to personalize and then choose one or
get more out of a synthesize across several
message

Activity 2: Reflect
1. What is the importance of information processing to you as a student?

2. In what instance/s in your life you performed the three tasks in information
processing?

What I Can Do

Activity 3: Read and React


Read the following articles to learn more about freedom of information in
Philippines and write a brief reaction.
a. “Freedom of Information: Timeline of FOI Legislation in the Philippines.”
(http://www.cmfr-phil.org/freedom-of-information/)
b. “A primer on Freedom of Information in the Philippines.”
(http://www.tan.org.ph/index.php?option=com_docman&task=doc_downlo
ad& gid=6)
c. “Why the Philippines needs a freedom of information law.”
(http://www.rappler.com/newsbreak/63794-why-philippines-needs-
freedom-ofinformation-law)

Activity 4: Mind Mapping Instruction:


Make a mind mapping about the topic of this module. A mind map is a
diagram used to visually organized information and it shows relationship to the
topic.

24
Assessment

A. Multiple Choice: Write the letter of the correct answer on your answer sheet.
1. A time or set of circumstances that makes it possible to do something.
A. Challenge B. Opportunity C. Power D. Empowerment
2. It is the idea of power and idea that power change, that the ownership of power
can shift from one entity to another.
A. Challenge B. Opportunity C. Power D. Empowerment
3. It is something new and difficult which requires great effort and determination.
A. Opportunity B. Power C. Challenge D. Empowerment
4. It is the most common type of cybercrime committed across the world.
A. Cyber Stalking B. Hacking C. Phishing D. E-mail Spoofing
5. It is a cybercrime in which a target or targets are contacted by email, telephone
or text message by someone posing as a legitimate institution to lure individuals
into providing sensitive data such as personally identifiable information,
banking and credit card details, and passwords.
A. Cyber Stalking B. Hacking C. Phishing D. E-mail Spoofing

B. True or False: Write True is the statement is correct, otherwise False. Write
the answer on your notebook.
__________1. Social networks are one of the fastest growing industries in the
world.
__________2. Tim Berners-Lee changed the world when he invented the
World Wide Web.
__________3. Cybercrime is “a crime committed with or through the use of
information and communication technologies such as radio, television, cellular
phone, computer and network, and other communication device or application.
__________4. Empowerment cannot be possible because power can expand or
diminish as the case may be.
__________5. The economics of media can be explained in the simple
equation Ratings= Revenues.
__________6. The Philippine media is a great asset in the country’s economy.
__________7. The existence of cheap or even free digital technologies like
torrent downloading makes piracy even more attractive to consumers.
__________8. Online education is now a fast-becoming trend in society.
__________9. The society is not heavily influenced by media and information.
__________10. Media and information have the power to sway society’s
beliefs and perception.

25
Additional Activity

Activity 5: Infographics
Instructions: Create infographics about the “Power of Social Media” in a short
bond paper and if possible, you can upload and save it in you google drive then,
share it to your teacher through email address.

Rubrics in Creating Infographics


3 points: Exceeds 2 points: Meets 1 point: Needs Work
Expectations Expectations
Topic/Purpose The topic/purpose of the The topic/purpose was somewhat The topic/purpose of the
infographic was clear and broad and did not allow viewer to infographic was not clear
concise. understand the purpose. and concise.
Data Data of the infographic Data of the infographic was Data of the infographic
was accurate and relevant somewhat accurate and relevant was not accurate and was
to topic to topic. not relevant to topic.
Layout The infographic had a The graphics were somewhat The graphics had nothing
great layout, with applicable to the infographic, to do with the topic and
applicable graphics. creating an average layout. had a poor layout. There
was an overload of text.
Color/Font The font was legible The font was somewhat legible The font was not legible
and the color scheme and the color scheme didn't effect and the color scheme
enhanced the the infographic. detracted from the
infographic. infographic.
Sourcing Citations for the Citations for some of the sources No citations of the
infographic's sources used were included. infrographic's sources were
were included. included.

References

Books
Liquigan, Boots C. Media and Information Literacy. Philippine: DIWA Learning System Inc., 2016
Zarate, Jovita E. Media and Information Literacy. 1st ed. Philippine: Rex Book Store, Inc. 2016

Web Sites
E-Learning Guide in Media and Information Literacy “The Opportunities, Challenges, and Power of Media and Information”
https://sites.google.com/view/elearningmil/lessons/the-opportunities-
challenges-and-power-of-media-and-information GCFGlobal:GCFLearnFree.org. “Internet Basics”.
https://edu.gcfglobal.org/en/internetbasics/ (accessed 21 June 2020)
“Media Convergence: Opportunities and Challenges.” https://mconvergence.wordpress.com/2011/12/12/media-convergenceopportunities-ans-
challenges/ (accessed 21 June 2020)
“The Media and Information Literate Individual” https://lh6.googleusercontent.com/YGsXgueSXNj6talOQW3wtbfX4ZnUwvd wluyfaYmq6ah
bvbg2WfuIS3uHnLL-
f4iwfg1C9bEbK7iyiwycoSXSpMYZ3apSci3zdhcwkV11C2_BJHNPIA=w472
(accessed 21 June 2020) https://www.colorado.edu/ecenter/sites/default/files/styles/large_square_thumb
nail/public/callout/newspapers_magazines_and_books.jpg?itok=y_8Lr7dR (Accessed 11 August 2020)
“Opportunities” English Oxford living dictionaries 2018. What Is opportunity? Access at: http:// www.en.oxforddictionaries.com’ (Accessed 11
August 2020)
“Challenges” https://www.collinsdictionary.com/ dictionary/english/challenge (Accessed 11 August 2020)
Technopedia . 2018. Cybercrime Access at:
https://www.techopedia.com/definition/2387/cybercrime (Accessed 11 August 2020)

26

You might also like