Media and Information Literacy: Quarter 1 - Module 7 - 8
Media and Information Literacy: Quarter 1 - Module 7 - 8
1
What I Need to Know
This module was designed and written with you in mind. It is here to help
you master the context of Media and Information Literacy. It contains varied
activities that can help you as a Senior High School student to not just be an
information literate individual, but a creative and critical thinker as well as
responsible user and competent producer of media and information.
The module contains lesson in Legal, Ethical, Societal Issues in Media and
Information.
What’s In
In previous lesson was about Media and Information Languages. The lesson
discusses the Media Languages, Codes, Conventions, and Messages, Audiences,
Procedures and Other stakeholders. In codes or conventions, you have to follow
standards like traffic signs if green means go then if it red meaning stop.
The next lesson we will tackling copyright, fair use, and plagiarism for
another standard to be followed.
2
What’s New
Activity 1: Complete Me. The following terms are all associated with ethical use
of media and information, before you proceed, try to figure out what these terms.
1. C___R_G_
2. C_MM__ S
3. P_ TE__
4. _A_R U__
5. F_AM__G
6. __BE_ __LL___G
7. __AG__R__M
8. _E__QU___E
What is It
What is copyright?
Copyright is mainly the protection of one’s expressions which only becomes
tangible and concepts when objects are created as manifestation of these
expression. Copyright could be a variety of protection provided by the laws to the
authors of “original works of authorship,” together with literary, dramatic,
musical, artistic, and bound different intellectual works. This protection is
obtainable to each revealed and unpublished works.
• Set of rights granted the author
• Creator of a piece, to limit others ability to repeat
• Redistribute and reshape the content.
Related Issues
A copyright protects solely original works of “authorship” enclosed within
the following seven categories:
• Literary works (including pc programs),
• Musical works, together with any incidental words,
• Dramatic works, together with any incidental music,
• Pantomimes and dance works,
• Pictorial, graphic, and sculptural works, • Motion photos and different
audiovisual works,
• Sound recordings.
3
Registering Copyright
Majority of the state signatories of WIPO adhere to the Berne convention
that provides automatic copyright protection. This means that a registration or any
other formality is not required. As for most countries, including the Philippine,
there is a system for voluntary registration of works. Such system “help solve
disputes over ownership or creation, as well as facilitate financial transactions,
sales, and the assignment and/or transfer of rights.”
Fair Use
Fair Use is the limitation and to the prerogative granted by copyright law to
the author of an ingenious work. samples of use embrace statement, search
engines, criticism, news coverage, research, teaching, library archiving and
scholarship.
Plagiarism
The plagiarism is copying or closely imitating the work of another author,
composer, etc., while no permission and with the intention of passing the results
of as original.
What is netiquette?
Netiquette refers to a collection of rules that governs what conduct is socially
acceptable in a web or digital scenario. It’s a social code of network
communication. Netiquette is a set of rules for behaving properly on-line. It
represents the importance of correct manners and behavior on-line. In general,
netiquette is that the set of skilled and social etiquettes practiced and advocated in
transmission over any electronic network. Common pointers embody being
courteous and precise, and avoiding cyber-bullying.
Netiquette additionally dictates that users ought to adapt copyright laws and
avoid over victimization emoticons. It could be a short type of network rule or net
rule. The word netiquette could be a combination of ‘net’ (from internet) and
‘etiquette’. It suggests that respecting alternative users’ views and displaying
common courtesy once posting your views to on-line discussion teams.
4
DO DON’T
- Respect other people’s - Name-call or express offensive opinions Post
- privacy Verify facts before - private or embarrassing images or comments
- reposting Check messages - Exclude people or talk behind their backs.
and respond promptly
5
6. Don’t Overload System Resources With Enormous Files
You might think that sequence of nature pictures with inspirational
statements is wonderfully moving. It might even give you a sense of serenity. But
that is the last thing it will give the person you email it to if it crashes their server,
depletes their inbox quota so their emails get bounced for a week before they
realize, or uses up the last bit of space they needed to complete an important
assignment. So post it to your own space and send people a link. Don’t attached it
to an email.
Digital Divide
Digital divide could be a term that refers to the gap between demographics
and regions that have access to trendy info and technology, and people that do not
or have restricted access. Before the late twentieth century, digital divide referred
principally to the division between those with and without phone access.
6
The digital divide generally exists between those in cities and people in rural
areas; between the educated and the uneducated; between socioeconomic groups;
and, globally, between the more and less industrially developed nations. Even
among populations with some access to technology, the digital divide can be
evident in the form of lower-performance computers, lower-speed wireless
connections, lower priced connections such as dial-up, and limited access to
subscription-based content (Rouse, 2014).
Computer Addiction
A disorder in which the individual turns to the Internet or plays computer
games to change moods, overcome anxiety, deal with depression, reduce isolation
or loneliness, or distract themselves from overwhelming problems. The elderly, as
well as children and adolescents, are particularly vulnerable because they may not
realize the extent of their dependency. In many instances, individuals with
computer addiction may seek help for another condition, such as depression,
phobias or other addictions (Shiel, 2018).
Bullying
Stopbullying.org (2019) defines bullying as unwanted, aggressive behavior
among school aged children that involves a real or perceived power imbalance.
The behavior is repeated, or has the potential to be repeated, over time. Both kids
who are bullied and who bully others may have serious, lasting problems.
In order to be considered bullying, the behavior must be aggressive and
include:
• An Imbalance of Power: Kids who bully use their power—such as physical
strength, access to embarrassing information, or popularity—to control or
harm others. Power imbalances can change over time and in different
situations, even if they involve the same people.
• Repetition: Bullying behaviors happen more than once or have the potential
to happen more than once.
Bullying includes actions such as making threats, spreading rumors,
attacking someone physically or verbally, and excluding someone from a group
on purpose.
Laws are enacted to enforce and recognition toward the fruits of other
people’s ingenuity. Inventions or creations serve some benefits to user, thus in the
logic of commerce of business, inventions and creators should be properly
compensated for their contribution. If their intellectual property right is protected,
people will be motivated to contribute more by continuously inventing and
creating for the public good on the spirit of fair play.
The WIPO is the “global forum for intellectual property service, policy,
information, and cooperation.” In the Convention Establishing the World
Intellectual Property Organization signed at Stockholm on 14 July 1967 and
amended on 28 September 1979, it has been agreed among the state signatories
that the WIPO will be “responsible for the promotion and protection of intellectual
property throughout the world through cooperation among state and, where
appropriate, in collaboration with other international organizations, and for the
administration of various treaties dealing with intellectual property rights,” WIPO
has classified the forms of IP .
8
Table 1. Types of Intellectual Property
Terms Description Coverage
• Legal terms used to describe • Books, Music, Paintings,
Copyright the rights that creators have Sculpture, Films, Computer
over their literary and artistic program, Databases,
works Advertisement, Maps,
Technical drawings
Provides the patent owner with • Exclusive right granted for
Patent the right to diced how, or an invention
whether, the invention can be
used by others in exchange for
this right. The patent owner
makes technical information
about the invention publicly
available in the published
patent document
Trademark • A sign capable of • Products sold or services
distinguishing goods or offered by a business entity
services of one enterprise from
those of other enterprises
• Dates back to ancient times
when craftsmen used to put
their signature or “mark” on
their products
Industrial • Constitutes the ornamental or • Design of an object (shape
Design aesthetic aspect of an or surface, patterns, lines, or
article/object colors)
Geographical • Sign used on goods that have • The name of the place of
Indication specific geographical origin origin of the goods/products
and and possess qualities, a
Appellation reputation or characteristics
of Origin that are essentially attributable
to that place of origin
9
According to this piece of legislation, intellectual property rights consist of:
1. Copyright and related rights;
2. Trademarks and service marks;
3. Geographic indication;
4. Industrial designs;
5. Patents;
6. Layout-designs {Topographies) of integrated circuits; and
7. Protection of understanding information.
10
1. Unprotected Subject Matter
• Any idea, produce, system, method or operation, concept, principle,
discovery or mere data as such, even if they are expressed, explained,
illustrated or embodied in a mark
• News of the day and other miscellaneous facts having the character of mere
items of press information
• Any official text of a legislative, administrative or legal nature, as well as
any official translation.
What’s More
ACTIVITY 3
a. In 100 words or more, explain the value of intellectual property especially in
the case of media content or products.
b. What is the main difference between copyright and patent?
c. Do you think technology and internet have made plagiarism easier? Do you
think technology has made people more or less creative? Explain your
answer with examples.
What I Can Do
2. Give one suggestion to avoid cyber bullying. Give one suggestion to avoid
being a cyberbully.
11
Assessment
A. Matching Type: Match column A with column B, write only the letter of your
correct answer in your notebook or notebook.
Column A Column B
B. True or False. Write True if the statement is correct, False if it is incorrect. Write
the answer on your notebook or answer sheet.
__________ 1. A copyright protects solely original works of “authorship” like literacy
works and sound recording.
__________ 2. Algorithm is a collection of rules that governs what conduct is socially
acceptable in a web or digital scenario.
__________ 3. In the internet always remember that real people take priority.
__________ 4. Never post private or embarrassing images or comments in social media.
__________ 5. Computer addiction is a disorder in which individual turns to the Internet
or plays computer games to change moods, overcome anxiety, deal with
depression, reduce isolation or loneliness, or distract themselves from
overwhelming problems.
12
Additional Activity
Reflection:
1. What are the basic rules in protecting yourself online?
REFERENCES
BOOKS
Liquigan, Boots C. Media and Information Literacy. Philippine: DIWA Learning System Inc., 2016
Zarate, Jovita E. Media and Information Literacy. 1st ed. Philippine: Rex Book Store, Inc. 2016
WEB SITES
GCFGlobal:GCFLearnFree.org. “Internet Basics”.
https://edu.gcfglobal.org/en/internetbasics/ (accessed 21 June 2020)
https://www.colorado.edu/ecenter/sites/default/files/styles/large_square_thumb
nail/public/callout/newspapers_magazines_and_books.jpg?itok=y_8Lr7dR (Accessed 11 August 2020)
https://iupui.libguides.com/longDesc/typesOfSources (Accessed 21 June 2020)
13
SENIOR HIGH SCHOOL
14
What I Need to Know
This module was designed and written with you in mind. It is here to help
you master the context of Media and Information Literacy. It contains varied
activities that can help you as a Senior High School student to not just be an
information literate individual, but a creative and critical thinker as well as
responsible user and competent producer of media and information.
What’s In
What’s New
Activity 1: Based on your experiences, draw a diagram that illustrates your prior
knowledge of opportunities, challenges, and power of social media and
information in your daily life.
15
What is It
16
Our society is a network society; that is, a society constructed around
personal and organizational networks powered by digital networks and
communicated by the Internet. And because networks are global and know no
boundaries, the network society is a global network society. This historically
specific social structure resulted from the interaction between the emerging
technological paradigm based on the digital revolution and some major
sociocultural changes. A primary dimension of these changes is what has been
labeled the rise of the Mecentered society, or, in sociological terms, the process
of individuation, the decline of community understood in terms of space, work,
family, and ascription in general.
This is not the end of community, and not the end of place-based interaction,
but there is a shift toward the reconstruction of social relationships, including
strong cultural and personal ties that could be considered a form of community,
on the basis of individual interests, values, and projects.
Opportunities, Challenges and Power of Media and Information
Opportunities Challenges Power
• Job Hiring • Fake News • Influence
• Empower Citizen • Unreliable • Distribution of
• Freedom of expression sources information
• Informing & keeping the mass up to date
• Inspire
• Faster and free communication
17
▪ Opportunity. A time or set of circumstances that makes it possible to do
something.
▪ Challenge. A challenge is something new and difficult which requires great
effort and determination.
▪ Power. When you heard the word “POWER”. For most of you, perhaps, the
word “control”. “Domination”, and “Influence” will immediately come to
mind. According to Weber (1946) power is often related to our ability to
make others do what we want, regardless of their own wishes or interests.
▪ Empowerment. It is the idea of power and idea that power change, that the
ownership of power can shift from one entity to another. Empowerment can
is possible because power can expand or diminish as the case may be.
18
The existence of cheap or even free digital technologies like torrent
downloading makes piracy even more attractive to consumers.
19
3. Media and Information for Social Science
The society is heavily influenced by media and information. It is no surprise
then that media and information have been linked to social changes. Oxford
bibliographies referred to the social change as a significant alteration of social
structure.
▪ The Opportunity. Among the first to realize the possible positive
applications of the media and society’s co-dependent relationships were
Daniel Lerner and Wilbur Schramm. In their perspective works, The Passing
of Traditional Society (1958) and Mass Media and National Development
(1964) served as the founding texts of development communication
according to University of Pennsylvania (UPenn). Development
communication uses communication to aid in the development of society.
One practical application of this is community-based media programs.
Through information dissemination, promotion of development advocacies,
and providing a medium for social interaction among communities, these
types of programs pave the way for a positive social change.
▪ The Challenge. Media and information have the power to sway society’s
beliefs and perception. People have the tendency to receive data from the
media and accept it as fact right away without conducting due diligence.
20
Some Opportunities
Television Broadcaster. A television presenter presents information relating to
subjects such as news and sports, and may also be responsible for planning the
creative content of a series. Such experts will work with news programs and help
to discuss important topics in reporting, as well as provide comments on various
events.
They might also formulate interview questions, read scripts, and reveal
details about the show, such as commercial breaks. Example: TV broadcasting.
Mobile Communication. A means of technology mediated communication that
allows the user of a mobile device to connect with someone else at a different
location, such as texting from a cell phone and sending email from a computer
device equipped with WiFi (e.g. laptop, iPad).
A mobile phone is a wireless portable device that allows users, to make and
receive calls, and send text messages. The first mobile phone generation would
only be able to make and receive calls. Today’s mobile phones are packed with
many additional features like web browsers, games, cameras, video players and
even navigation systems.
Through media, people now a day’s can easily catch up news and be updated
because of television broadcaster. In the other side, mobile communication can
make our life easier. No need to write a letter if you want to ask allowance to your
mom instead just text and call. How amazing isn’t?
Some Challenges
Cybercrime. is defined as a crime in which a computer is the object of the crime
(hacking, phishing, spamming) or is used as a tool to commit an offense (child
pornography, hate crimes). Cybercriminals may use computer technology to
access personal information, business trade secrets or use the internet for
exploitative or malicious purposes.
Here are the Four Types of Cybercrime:
1. Hacking is the most common type of cybercrime committed across the world.
Hacking is a crime which entails cracking systems and gaining unauthorized
access to the data stored in them. Hacker is a person who breaks in to a computer
system.
2. Cyber stalking is use of internet or other electronic means to stalk someone.
It is online harassment and online abuse. Mostly cyber stalking involves
following a person’s movement across the internet by posting threatening
messages to the victim or by entering the chat rooms frequented by the victim
or by constantly bombarding the victim with the e-mails etc.
21
3. Virus dissemination. Virus is the programs which attach themselves to the
computer or file and then circulate themselves to other files and to other
components on a network. They usually affect the data on the computer, either
by altering or deleting it.
4. E-mail Spoofing. An e-mail that appears to originate from one source but
actually has been sent from another source. This can also be termed as e-mail
forging.
After you read about the two challenges, let us dig deeper what makes
phishing and cybercrime a challenge in media and information.
Phishing is an illegal action or crime. Where in the hacker will hack or get
all your information’s over the internet. For example, your bank account details,
your personal information’s and even your credit card details. So, for you to be
safe in phishing avoid posting your personal information’s over the internet.
22
Below are cybercrime-related laws in the Philippines:
• Republic Act No. 10175 – Cybercrime Prevention Act of 2012
• Republic Act No. 9995 – Anti-photo Voyeurism Act of 2009
• Republic Act No. 9775 – Anti-child Pornography Act of 2009
• Republic Act No. 9208 – Anti-trafficking in Persons Act of 2003
• Republic Act No. 8792 – E-commerce Act of 2000
• Republic Act No. 8484 – Access Device Regulation Act of 1998; and
• Republic Act No. 4200 – Anti-wiretapping Law.
What’s More
23
Meaning To use basic To access previously Referents in
Matching competencies to recognize learned meanings messages.
referents and locate efficiently
previously learned
definitions for each
Meaning To use skills in order to To interpret messages from One’s own
Construction move beyond meaning more than one perspective as knowledge
matching and to construct a means of identifying the structures.
meaning for one’s self in range of meaning options,
order to personalize and then choose one or
get more out of a synthesize across several
message
Activity 2: Reflect
1. What is the importance of information processing to you as a student?
2. In what instance/s in your life you performed the three tasks in information
processing?
What I Can Do
24
Assessment
A. Multiple Choice: Write the letter of the correct answer on your answer sheet.
1. A time or set of circumstances that makes it possible to do something.
A. Challenge B. Opportunity C. Power D. Empowerment
2. It is the idea of power and idea that power change, that the ownership of power
can shift from one entity to another.
A. Challenge B. Opportunity C. Power D. Empowerment
3. It is something new and difficult which requires great effort and determination.
A. Opportunity B. Power C. Challenge D. Empowerment
4. It is the most common type of cybercrime committed across the world.
A. Cyber Stalking B. Hacking C. Phishing D. E-mail Spoofing
5. It is a cybercrime in which a target or targets are contacted by email, telephone
or text message by someone posing as a legitimate institution to lure individuals
into providing sensitive data such as personally identifiable information,
banking and credit card details, and passwords.
A. Cyber Stalking B. Hacking C. Phishing D. E-mail Spoofing
B. True or False: Write True is the statement is correct, otherwise False. Write
the answer on your notebook.
__________1. Social networks are one of the fastest growing industries in the
world.
__________2. Tim Berners-Lee changed the world when he invented the
World Wide Web.
__________3. Cybercrime is “a crime committed with or through the use of
information and communication technologies such as radio, television, cellular
phone, computer and network, and other communication device or application.
__________4. Empowerment cannot be possible because power can expand or
diminish as the case may be.
__________5. The economics of media can be explained in the simple
equation Ratings= Revenues.
__________6. The Philippine media is a great asset in the country’s economy.
__________7. The existence of cheap or even free digital technologies like
torrent downloading makes piracy even more attractive to consumers.
__________8. Online education is now a fast-becoming trend in society.
__________9. The society is not heavily influenced by media and information.
__________10. Media and information have the power to sway society’s
beliefs and perception.
25
Additional Activity
Activity 5: Infographics
Instructions: Create infographics about the “Power of Social Media” in a short
bond paper and if possible, you can upload and save it in you google drive then,
share it to your teacher through email address.
References
Books
Liquigan, Boots C. Media and Information Literacy. Philippine: DIWA Learning System Inc., 2016
Zarate, Jovita E. Media and Information Literacy. 1st ed. Philippine: Rex Book Store, Inc. 2016
Web Sites
E-Learning Guide in Media and Information Literacy “The Opportunities, Challenges, and Power of Media and Information”
https://sites.google.com/view/elearningmil/lessons/the-opportunities-
challenges-and-power-of-media-and-information GCFGlobal:GCFLearnFree.org. “Internet Basics”.
https://edu.gcfglobal.org/en/internetbasics/ (accessed 21 June 2020)
“Media Convergence: Opportunities and Challenges.” https://mconvergence.wordpress.com/2011/12/12/media-convergenceopportunities-ans-
challenges/ (accessed 21 June 2020)
“The Media and Information Literate Individual” https://lh6.googleusercontent.com/YGsXgueSXNj6talOQW3wtbfX4ZnUwvd wluyfaYmq6ah
bvbg2WfuIS3uHnLL-
f4iwfg1C9bEbK7iyiwycoSXSpMYZ3apSci3zdhcwkV11C2_BJHNPIA=w472
(accessed 21 June 2020) https://www.colorado.edu/ecenter/sites/default/files/styles/large_square_thumb
nail/public/callout/newspapers_magazines_and_books.jpg?itok=y_8Lr7dR (Accessed 11 August 2020)
“Opportunities” English Oxford living dictionaries 2018. What Is opportunity? Access at: http:// www.en.oxforddictionaries.com’ (Accessed 11
August 2020)
“Challenges” https://www.collinsdictionary.com/ dictionary/english/challenge (Accessed 11 August 2020)
Technopedia . 2018. Cybercrime Access at:
https://www.techopedia.com/definition/2387/cybercrime (Accessed 11 August 2020)
26