Uploaded by Magno Quia-ot

B MIL Q1M8 Learner Copy Final Copy

advertisement
Senior High School
Media and Information
Literacy
Quarter 1 – Module 8
Legal, Ethical, and Societal Issues
in Media and Information
COPYRIGHT 2020
Section 9 of the Presidential Decree No. 49 provides:
“No copy shall subsist in any work of the Government of the Philippines.
However, prior approval of the government agency or office wherein the work is created shall
be necessary for exploitation of such work for profit.”
The original version of this material has been developed in the Schools Division of Surigao del
Norte through the Learning Resource Management and Development Section of the Curriculum
Implementation Division. This material can be reproduced for educational purposes; modified for the
purpose of translation into another language; and creating of an edited version and enhancement of
work are permitted, provided all original work of the author and illustrator must be acknowledged and
the copyright must be attributed. No work may be derived from any part of this material for commercial
purposes and profit.
This material has been approved and published for online distribution through the Learning
Resource Management and Development System (LRMDS) Portal (http://lrmds.deped.gov.ph) and
Division Network Academy (https://netacadsdn.com).
Development Team of the Module
Writer:
Lucyl L. Morales
Editor:
Iris Jane M. Canoy
Reviewer:
Krystel Grace L. Calderon
Illustrators:
Danilo L. Galve, Stephen B. Gorgonio
Layout Artists:
Ivan Paul V. Damalerio, Alberto S. Elcullada, Jr.
Management Team:
Ma. Teresa M. Real
Laila F. Danaque
Dominico P. Larong, Jr.
Gemma C. Pullos
Manuel L. Limjoco, Jr.
Printed in the Philippines by
Department of Education – Schools Division of Surigao del Norte
Office Address:
Tel. No.:
E-mail Address:
Peñaranda St., Surigao City
(086) 826-8216
surigao.delnorte@deped.gov.ph
Senior High School
Media and Information
Literacy
Quarter 1 – Module 8
Legal, Ethical, and Societal Issues
in Media and Information
ii
Introductory Message
For the facilitator:
Welcome to the Media and Information Literacy Self-Learning Module on Legal,
Ethical, and Societal Issues in Media and Information.
This module was collaboratively designed, developed and reviewed by
educators both from public and private institutions to assist you, the teacher or
facilitator in helping the learners meet the standards set by the K to 12 Curriculum
while overcoming their personal, social, and economic constraints in schooling.
This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this also aims
to help learners acquire the needed 21st century skills while taking into consideration
their needs and circumstances.
In addition to the material in the main text, you will also see this box in the body
of the module:
Notes to the Teacher
This contains helpful tips or strategies that will help
you in guiding the learners.
As a facilitator, you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing them to
manage their own learning. Furthermore, you are expected to encourage and assist
the learners as they do the tasks included in the module.
For the learner:
Welcome to the Media and Information Literacy Self-Learning Module on Legal,
Ethical, and Societal Issues in Media and Information.
This module was designed to provide you with fun and meaningful opportunities
for guided and independent learning at your own pace and time. You will be enabled
to process the contents of the learning resource while being an active learner.
Legal, Ethical, and Societal Issues
in Media and Information
CONTENT STANDARD
The learner organizes a creative and interactive symposium for the community
focusing on being a media and information literate individual.
PERFORMANCE STANDARD
The learners should be able to demonstrates understanding of media and
information literacy (MIL) and MIL related concepts.
LEARNING COMPETENCY
The learners should be able to:
1. Cite practical situation when to apply knowledge in intellectual property,
copy right, and fair use guidelines
2. Create a campaign add to combat digital divide, addiction, and bullying
LEARNING OBJECTIVES
The learner:
1. Explains and puts into practice the understanding of the intellectual
property, copy right, and fair use guidelines
2. Demonstrates proper conduct and behavior online (netiquette, virtual self)
3. Puts into action their personal resolve to combat digital divide, addiction,
and bullying
4. Explains actions to promote ethical use of media and information
5. Enumerates opportunities and challenges in media and information.
INTRODUCTION
Information and media literacy (IML) enables people to show and make
informed judgments as users of information and media. Basically, media literacy helps
students become wiser consumers of media as well as responsible producers of their
own media. In a larger context, the ethical use of media is each person's responsibility
whether one is a student or a professional. Proper use of media
Can make you a better, well-informed individual, but can also enable you to create a
change in the world.
In this module, you will learn on different legal, ethical, and societal issues in
media and information. Specifically, you will know how to put into practice the
knowledge in intellectual property, copyright and fair use. You will also encourage to
create a campaign add to combat digital divide, addiction, and bullying.
1
PRE-TEST
Instructions: Read each item carefully and identify what is asked or described.
Encircle the letter of the correct answer. “This is your first task; I wish you Good Luck!”
1. It is a legal concept that allows the reproduction of copyrighted material for
certain purposes
without obtaining permission and without paying a fee
A. Plagiarism
C. Copyright
B. Fair Use
D. infringement
2. It is the deliberate use of someone else's identity, usually as a method to gain
a financial advantage or obtain credit and other benefits in the other person's
name, and perhaps to the other person's disadvantage or loss
A. Identity theft
C. plagiarism
B. cyber defamation
D. digital piracy
3. Refers to the virtual computer world, and more specifically, is an electronic
medium used to form a global computer network to facilitate online
communication
A. Cybercrime
C. Cybersex
B. Cyberbullying
D. Cyberspace
4. What Republic Act that aims to address legal issues concerning online
interactions and the Internet
A. REPUBLIC ACT NO. 10185
B. REPUBLIC ACT NO. 10175
C. REPUBLIC ACT NO. 11276
D. REPUBLIC ACT NO. 12115
5. Phishing is the attempt to obtain sensitive information such as the following
EXCEPT one.
A. usernames
C. credit card details
B. passwords
D. address
6. It is described as the practice of illegally copying and selling digital music, video,
computer software, etc.
A. Cyber defamation
C. digital piracy
B. identity theft
D. Cybersquatting
2
7. Which of the following statements describe what is Fair Use?
A. Legal concept that allows the reproduction of copyrighted material for
certain purposes without obtaining permission and without paying a
fee
B. Registering, trafficking in, or using an Internet domain name with bad
faith intent to profit from the goodwill of a trademark belonging to
someone else.
C. act of stealing can be avoided by acknowledging the source or the
original creator through citations.
D. Set of rules for behaving properly online.
8. Which of the following statements is true about Copyright?
A. Allows the reproduction of copyrighted material for certain purposes
without obtaining permission and without paying a fee
B. Disparities in access to telephones, personal computers, and the
internet across certain demographic groups
C. The owner has the exclusive right to reproduce, distribute, perform,
display, license, and to prepare derivative works based on the
copyrighted work.
D. Uses internet domain name with bad faith intent to profit from the
goodwill of a trademark belonging to someone else.
9. Those individuals who engage in computer hacking activities are typically
referred to as _______.
A. hacker
C. composer
B. writer
D. handler
10. Plagiarism can be avoided by ______________the source or the original
creator through citations.
A. forgetting
C. mentioning
B. paying
D. acknowledging
11. Which of the following is NOT an exclusive right of the owner of the copyright?
A. reproduces
C. distributes
B. report
D. perform
12. In relation to cyberbullying, which of the following is NOT an example of this?
A. text messages or emails composed to insult or demean
B. rumors or false statements spread by email or posted on social
networking sites
C. humiliating photos, videos
D. spreading good news
3
13. A Media teacher has a textbook that she thinks would be ideal for her students.
However, the school cannot afford to buy a class set. The teacher may
A. Legally make multiple copies of stories from the textbook for use in
class
B. Legally make one copy of a story she likes and post it on the Internet
for students to use
C. Not copy the story for her students
D. Require the students to buy books.
14. A teacher uses clipart from the Internet for a class PowerPoint presentation. Is
this fair use?
A. Yes
C. Maybe
B. No
D. All of the above
15. A student wants to use a popular song for a video he is creating for a class
assignment. The best advice to give him would be
A.
Choose another song
B.
Use only 10 seconds of the song
C.
Use only a minute of a song
D.
To go ahead and use the whole song
“Congratulations you made it!
If you think all your answers are correct, very good! This shows that you already
know much about the topics in this module. You may still study the module to review
what you already know. Who knows, you might learn a few more new things as well.
If you think you got a low score, don’t feel bad. This means that this module is
for you. It will help you to understand some important concepts that you can apply in
your daily life. If you study this module carefully, you will learn the answers to all the
items in the test and a lot more!
Are you ready? Let’s go!”
4
REVIEW OF THE PREVIOUS MODULE
The previous module is all about media codes and conventions. Match the type
of codes and conventions to its example/ description by writing the correct answer on
the space before the number.
Type of Code/Convention
Example/ Description
_______1. Technical code
a. acting
_______2. Written code
b. printed language
_______3. Symbolic code
c. system of signs
_______4. convention
d. story convention
_______5. code
e. camerawork
PRESENTATION OF THE NEW MODULE
With the existence of the new media, everyone is at liberty contributed and post
information online. The problem with this evolutionary form of media is the lack of
check and balance that traditional media requires. Often, those who post their opinions
are taken as facts that may sometimes result of defamation. With this different case
all over the world. Such a problem reiterates the need for responsible use of social
media information.
With current provision in the law help in ensuring everyone’s right to privacy.
However, it is important to note that self-discretion goes a long way in protecting one’s
privacy.
ACTIVITY
“SEEK YE FIRST” Instructions: Locate the given words in the grid. Circle the 10
words listed below.
P
O
R
N
O
G
R
A
P
H
Y
O
K
P
W
S
F
Y
G
U
Y
N
K
Q
A
U
P
V
L
D
E
C
B
C
W
H
U
Q
M
C
S
H
T
A
O
D
S
O
E
A
L
E
I
T
O
A
H
S
G
I
I
C
U
P
R
R
O
S
A
A
I
G
T
I
P
V
Y
Q
E
Y
B
I
I
J
S
K
O
U
A
C
I
B
O
E
U
R
U
P
I
U
A
A
I
R
E
D
E
K
F
G
J
I
L
L
A
A
E
O
I
P
5
L
R
O
I
E
T
I
G
L
A
I
U
O
S
Q
A
K
G
N
I
K
C
A
H
Y
T
O
E
M
Y
T
A
A
Y
H
D
L
O
I
T
I
I
A
A
U
I
E
X
E
S
R
E
B
Y
C
E
N
G
O
U
G
E
I
U
O
A
C
I
O
U
T
S
G
I
P
I
N
F
R
I
N
G
E
M
E
N
T
A
E
D
D
I
F
R
O
G
F
R
H
K
I
O
E
T
S
Guide Question:
1. What do you think does these concepts mean?
“Very good! I know you can do it. Now it’s time for you to EXPLORE the mystery
behind those words. You’re doing great!”
COPYRIGHT
PLAGIARISM
CYBERSEX
DIGITAL DIVIDE
INFRINGEMENT
HACKING
CYBER
CYBERBULLYING
DIGITAL PIRACY
PORNOGRAPHY
ANALYSIS
PICTURE ANALYSIS
Instructions: Give what is your point of view regarding on the pictures below.
1.
https://www.google.com/search?q=picture+on+cyberbullying&source
2.
https://www.google.com/search?q=picture+on+cybersex&tbm
3.
https://www.google.com/search?q=picture+on+digital+piracy+&tbm
6
4.
https://www.google.com/search?q=copyright&tbm
5.
https://www.google.com/search?q=computer+addiction&tbm
“Good job! I told you can do this.”
ABSTRACTION
REPUBLIC ACT NO. 10175
Cybercrime Prevention Act of 2012
• It is a law in the Philippines approved on September 12, 2012 with main
purpose to address legal issues concerning online interactions and the
Internet
• Cybercrime offenses are the following: cybersquatting, cybersex, child
pornography, identity theft, illegal access to data and libel.
CYBER means connecting to, or relating computers or computer networks
(such as the Internet) CYBERSPACE denotes to the virtual computer world and it is
an electronic medium used to make a global computer network to enable online
communication CYBERCRIME denotes to the criminal happenings carried out by
means of computers or the Internet CYBERBULLYING is the use of electronic
gadgets to communicate someone just to bully through sending frightening or
threatening messages.
HACKING denotes to the exercise of adjusting or changing computer software
and hardware to complete a goal that is considered to be outside of the creator's
original objective. Hacking individuals who participate in computer hacking activities
are known to as “hackers”.
PHISHING is the attempt to get delicate information like the usernames,
passwords, and credit card details. ILLEGAL DOWNLOADING refers to getting files
7
that you do not have the right to use from the Internet. DIGITAL PIRACY is the practice
of copying and selling digital music, video, computer software illegally. IDENTITY
THEFT refers to the deliberate use of someone else's identity, usually as a method to
get a financial benefit or gain credit and other benefits in the other person's name.
CYBER DEFAMATION is a lowly false statement of fact that inclines to harm
the name of a person or company
Types of Defamation:
1. Libel is a written method of defamation which is expressed by print,
writing, pictures, dummies, signs or any other medium of communication
embodied in physical form that is harmful to a person’s reputation and or
exposes a person to public hatred or contempt or harms a person in
his/her profession or business.
2. Slander – also known as oral or spoken defamation, is the legal term for
the act of harming a person’s reputation whether in his/her profession or
business by telling other people something that is not true that can
damage that person.
CYBERSEX is also called computer sex, Internet sex, netsex • It is a virtual sex
meeting in which two or more people send each other sexually clear contents or
sexually clear acts. CHILD PORNOGRAPHY is a form of child sexual manipulation
CYBERSQUATTING is recording, trading in, or using an Internet domain name
with bad faith intent to yield from the goodwill of a trademark belonging to someone
else. The cybersquatter then offers to trade the domain to the person or company who
owns a trademark confined within the name at an inflated price.
COPYRIGHT it means the right to copy. A person violating copyright commits
plagiarism. PLAGIARISM happens when someone else’s work is used by a different
person and claimed as his or her own. This performance of stealing can be avoided
by recognizing the source or the original maker through citations. INFRINGEMENT is
the violation of a copyright. The exclusive rights of the copyright owner are subject to
limitation by doctrine of “fair use”. FAIR USE of copyrighted work for criticism,
comment, news reporting, teaching, scholarship, or research is not copyright
infringement. FAIR USE is a legal concept that allows copyrighted material to be
reproduce without getting consent and without paying a fee. Review, news reporting,
teaching, or scholarly research are some of the purposes that permits the application
of fair use.
COMPUTER ADDICTION is the extreme use of computers to the degree that
it affects with daily life. This extreme use may interfere with work or sleep, result in
problems with social interaction, or affect mood, relationships and thought processes.
8
DIGITAL DIVIDE as the gaps in accessing to telephones, personal computers,
and the internet across certain demographic groups. Different segments have different
levels of access to digital developments due to a number of factors.
CYBERBULLYING, or BULLYING through electronic means, it is one of the
many problems brought about by developments in technology. With the presence
smartphones, tablets, laptops, and 24/7 access to internet, cyberbullying can occur to
anyone, anywhere, and at any time. This may include exposing awkward content
about someone or sending messages with the intention of hurting the receiver
emotionally or mentally.
Examples of cyberbullying: text messages or emails composed to insult or
demean; rumors or false statements spread by email or posted on social networking
sites; and humiliating photos, videos, websites, or making fake profiles shared on
social media.
NETIQUETTE or NETWORK ETIQUETTE is a set of rules for behaving
properly online.
• It refers to the proper attitude that an individual should observe when
interacting online.
• Is a combination of the words network and etiquette and it is defined as
a set of rules for suitable online behavior.
The Core Rules of Netiquette
Rule 1. Remember the human. Do not forget that the individual that is reading
your mail or posting is the individual with feelings that can be hurt.
• Corollary 1 to Rule #1: It's not good to hurt other people's emotions.
Rule 2. Adhere to the same standards of behavior online that you follow in real
life.
• Corollary 1: Be ethical.
• Corollary 2: Breaking the law is bad Netiquette.
Rule 3. Know where you are in cyberspace.
• Corollary 1: Netiquette varies from domain to domain.
• Corollary 2: Lurk before you leap.
Rule 4. Respect other people's time and bandwidth.
9
APPLICATION
To apply your learning in this lesson,
1. Make a short educational campaign video about how to combat digital
divide, addiction, bullying and other legal societal issues on media
information.
2. Choose only one issue. Give a short description about it.
3. The minimum time is 1 minute and maximum time of 3 minutes.
4. In the end portion of your educational campaign video, give advices or
tips on how to use media information responsibly.
5. Do share your educational video through Facebook on your FB account.
EVALUATION RUBRIC FOR EDUCATIONAL CAMPAIGN VIDEO
Excellent
Needs
Improvement
Good
Satisfactory
Concept The video
clearly
demonstrates a
key concept.
(30 pts)
The video
demonstrates
key concepts.
(25 pts.)
The video
demonstrates
a previous
concept.
(20pts.)
The video
does not
demonstrate
a clear
concept.
(15 pts.)
Design
The quality and
materials in the
video are very
well organized
and
understandable.
(30 pts.)
The quality
and materials
in the video
adequately
organized and
somewhat
clear.(25pts.)
The quality
and materials
in the video
lacked some
organization
and 50%
clear.
(20pts.)
The quality
and materials
in the video
are not
organized
and lack
clarity.
(15 pts.)
Final
Product
Final product
looks
professional
and the
concepts were
visibly
demonstrated.
(40 pts.)
Final product
looks decent
and the
concepts
were
somewhat
demonstrated.
( 5 pts.)
Final product l
required more
revisions and
the concepts
were not
clearly
demonstrated.
(30 pts.)
Final product
looks
unrefined and
the concepts
were not
demonstrated.
(25 pts.)
Score
TOTAL SCORE
/100pts.
Enjoy in making your campaign video!!! That was excellent!
10
REFLECT
You did it well! Congratulations! You have just had an amazing learning journey.
For the last time, share your final insights by completing the following sentence
prompts. It was such a wonderful learning experience with you.
1.
2.
3.
One thing I found interesting about copyright is _________
One thing that I cannot forget in this module is _____________
Another thing I would like to learn about legal and societal issues in media
information is that ____________________________________________
LEARN MORE
A. Make an essay on how to promote ethical use of media and information.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
B. In a form of a table, enumerate the opportunities and challenges in media
and information.
OPPORTUNITIES
CHALLENGES
MEDIA AND
INFORMATION
Watch the video in the following websites:
1. https://www.youtube.com/watch?v=6kW_gJioncA
2. https://www.youtube.com/watch?v=zLSCqVxHwPE
3. https://www.youtube.com/watch?v=b_fulKc5wh0
It will give you additional information about this lesson. It would be very much
exciting to learn more! Don’t forget to share what you have learned to others.
11
POST-TEST
Instructions: Read each item carefully and identify what is asked or described.
Encircle the letter of the correct answer. “You can do it!” ☺
1. Which of the following is NOT an exclusive right of the owner of the copyright?
A. reproduces
C. distributes
B. report
D. performs
2. In relation to cyberbullying, which of the following is NOT an example of this?
A. text messages or emails composed to insult or demean
B. rumors or false statements spread by email or posted on social
networking sites
C. humiliating photos, videos
D. spreading good news
3. A Media teacher has a textbook that she thinks would be ideal for her students.
However, the school cannot afford to buy a class set. The teacher may
A. Legally make multiple copies of stories from the textbook for use in
class
B. Legally make one copy of a story she likes and post it on the Internet
for students to use
C. Not copy the story for her students
D. Require the students to buy books.
4. A teacher uses clipart from the Internet for a class Powerpoint presentation. Is
this fair use?
A. Yes
C. Maybe
B. No
D. All of the above
5. A student wants to use a popular song for a video he is creating for a class
assignment. The best advice to give him would be
A. Choose another song
B. Use only 10 seconds of the song
C. Use only a minute of a song
D. To go ahead and use the whole song
6. Those individuals who engage in computer hacking activities are typically
referred to as _______.
A. hacker
C. composer
B. writer
D. handler
12
7. Plagiarism can be avoided by ______________the source or the original
creator through citations.
A. forgetting
C. mentioning
B. paying
D. acknowledging
8. It is described as the practice of illegally copying and selling digital music, video,
computer software, etc.
A. Cyber defamation
B. identity theft
C. digital piracy
D. Cybersquatting
9. Which of the following statements describe what is Fair Use?
A. Legal concept that allows the reproduction of copyrighted material for
certain purposes without obtaining permission and without paying a
fee
B. Registering, trafficking in, or using an Internet domain name with bad
faith intent to profit from the goodwill of a trademark belonging to
someone else.
C. act of stealing can be avoided by acknowledging the source or the
original creator through citations.
D. Set of rules for behaving properly online.
10. Which of the following statements is true about Copyright?
A. Allows the reproduction of copyrighted material for certain purposes
without obtaining permission and without paying a fee
B. Disparities in access to telephones, personal computers, and the
internet across certain demographic groups
C. The owner has the exclusive right to reproduce, distribute, perform,
display, license, and to prepare derivative works based on the
copyrighted work.
D. Uses internet domain name with bad faith intent to profit from the
goodwill of a trademark belonging to someone else.
11. It is a legal concept that allows the reproduction of copyrighted material for
certain purposes without obtaining permission and without paying a fee
A. Plagiarism
C. Copyright
B. Fair Use
D. infringement
12. It is the deliberate use of someone else's identity, usually as a method to gain
a financial advantage or obtain credit and other benefits in the other person's
name, and perhaps to the other person's disadvantage or loss
A. Identity theft
C. plagiarism
B. cyber defamation
D. digital piracy
13
13. Refers to the virtual computer world, and more specifically, is an electronic
medium used to form a global computer network to facilitate online
communication
A. Cybercrime
C. Cybersex
B. Cyberbullying
D. Cyberspace
14. What Republic Act that aims to address legal issues concerning online
interactions and the Internet
A. REPUBLIC ACT NO. 10185
B. REPUBLIC ACT NO. 10175
C. REPUBLIC ACT NO. 11276
D. REPUBLIC ACT NO. 12115
15. Phishing is the attempt to obtain sensitive information such as the following
EXCEPT one.
A. usernames
C. credit card details
B. passwords
D. address
“Hey, I would like to send my congratulation to you! You’re so amazing.
I hope you got a perfect score by this time. But if you still have some errors, you
may read the module again and do some additional research.”
14
REFERENCES
http://www.albion.com/netiquette/book/0963702513p32.html
https://sites.google.com/view/elearningmil/lessons/the-legal-ethical-andsocietal-issues-in-media-and-information/netiquette
https://www.slideshare.net/markjhonoxillo/legal-ethical-and-societal-issues-inmedia-and-information
15
For inquiries or feedback, please write or call:
Department of Education – Schools Division of Surigao del Norte
Peñaranda St., Surigao City
Surigao del Norte, Philippines 8400
Tel. No: (086) 826-8216
Email Address: surigao.delnorte@deped.gov.ph
16
Download