12
11
Learning Materials
MODULE NAME: ________________________________________
GRADE & SECTION: ______________________________
4
Media and Information Literacy Module 4
Legal, Ethical, and Societal Issues in Media and Information Literacy
This module covers the knowledge, skills and attitudes required to “Legal,
Ethical, and Societal Issues in Media and Information”. Define and explain
copyright and other related issues, discuss the difference between copyright
infringements between plagiarisms. Discuss current issues related to copyright in
relation to actions of government and private sectors, including but not limited to
Cybercrime Law RA10175, identify the different types of bullying. Explain actions
to promote ethical use of media and information, applying the 10 Basic Rules of
Netiquette or Internet Etiquette Know Your Manners When Using Technology.
LEARNING OBJECTIVES:
At the end of the lesson, the learners shall be able to:
1. Put into practice their understanding of the intellectual property, copy
right, and fair use guidelines (MIL11/12LESI-IIIg-17),
2. Demonstrates proper conduct and behavior online (netiquette, virtual self)
(MIL11/12LESI-IIIg-18),
3. Put into action their personal resolve to combat digital divide, addiction,
and bullying (MIL11/12LESI-IIIg-19),
4. Explain copyright, fair use, etc.vis-a-vis human rights (MIL11/12LESI-IIIg-
20)
5. Discuss current issues related to copyright vis-à-vis gov’t./provide sectors
actions (MIL11/12LESI-IIIg-21), and
6. Explain actions to promote ethical use of media and information
(MIL11/12LESI-IIIg-22).
Copy Right, Fair Use and Plagiarism
Definition of terms:
• Copyright - a legal device that provides the creator of a literary, artistic, musical,
or different inventive work the only real right to publish and sell that job.
Copyright owners have the proper to manage the copy of their work, together
with the proper to receive payment for that reproduction. Violation of a copyright
is named infringement.
• Plagiarism - an act or instance of victimization or closely imitating the language
and thoughts of another author while not authorization; the illustration of that
author’s work as one’s own, as by not crediting the first author.
• Cyber Bullying - bullying that takes place on-line, or victimization electronic
technology like cell phones, computers, and tablets over communication tools
together with social media sites, text messages, chat, and websites. Samples of
cyber bullying: text messages or emails composed to insult or demean; rumors or
false statements unfold by email or denote on social networking sites; and
undignified photos, videos, websites, or faux profiles deliberately shared across
social media.
• Laptop Addiction - the excessive use of computers to the extent that it interferes
with standard of living, particularly in using technological device. This excessive
use could as an example interfere with work or sleep, lead to issues with social
interaction, or have an effect on mood, relationships, and thought processes.
• Digital divide - an economic difference between teams in terms of access to, use
of, or data of ICT. The divide inside countries (such because the digital divide
within the United States) will check with inequalities between people, households,
businesses, and geographic areas at completely different socioeconomic (and
different demographic) levels. The worldwide digital divide designates countries
because the units of study and examines the divide between developing and
developed countries on a global scale.
COPYRIGHT Copyright could be a variety of protection provided by the laws of the
US (title seventeen, U.S. Code) to the authors of “original works of authorship,”
together with literary, dramatic, musical, artistic, and bound different intellectual
works. This protection is obtainable to each revealed and unpublished works.
• Set of rights granted the author
• Creator of a piece, to limit others ability to repeat
• Redistribute and reshape the content.
RELATED ISSUES
A copyright protects solely original works of “authorship” enclosed within the
following seven categories:
• Literary works (including pc programs),
• Musical works, together with any incidental words,
• Dramatic works, together with any incidental music,
• Pantomimes and dance works,
• Pictorial, graphic, and sculptural works,
• Motion photos and different audiovisual works,
• Sound recordings.
FAIR USE Refers to the limitation and to the prerogative granted by copyright law
to the author of an ingenious work. Samples of use embrace statement, search
engines, criticism, news coverage, research, teaching, library archiving and
scholarship.
PLAGIARISM Copying or closely imitating the work of another author, composer,
etc., while not permission and with the intention of passing the results off as
original work.
Netiquette
WHAT IS NETIQUETTE?
NETIQUETTE refers to a collection of rules that governs what conduct is
socially acceptable in a web or digital scenario. It’s a social code of network
communication. Netiquette is a set of rules for behaving properly on-line. It
represents the importance of correct manners and behavior on-line. In general,
netiquette is that the set of skilled and social etiquettes practiced and advocated
in transmission over any electronic network. Common pointers embody being
courteous and precise, and avoiding cyber-bullying.
Netiquette additionally dictates that users ought to adapt copyright laws and
avoid over victimization emoticons. It could be a short type of network rule or net
rule. The word netiquette could be a combination of ‘net’ (from internet) and
‘etiquette’. It suggests that respecting alternative users’ views and displaying
common courtesy once posting your views to on-line discussion teams.
10 Basic Rules of Netiquette or Internet Netiquette
The rules of etiquette are just as important in cyberspace as they are in the
real world and the evidence of poor netiquette can stick around a haunt you for
too much longer. Follow these basic rules of netiquette to avoid damaging your
online and offline relationships.
DO DON’T
Respect other people’s privacy Name-call or express offensive pinions
Verify facts before reposting Post private or embarrassing images or
comments
Check messages and respond promptly
Exclude people or talk behind their backs
1. Remember that Real People Take Priority- If someone is in the room with
you, stop what you are doing and look at them. Don’t answer your cell phone
unless it is to tell the person on the other end that you will call them right
back. If you are expecting an important call or email, let the person with you
know upfront, and apologize for taking the call.
2. If You Wouldn’t Say it to Someone’s Face, Don’t Say it Online- Name-calling,
cursing, expressing deliberately offensive opinions—if you wouldn’t do it to
the face of anyone who might conceivably see what you write, don’t write it.
This goes for any social media site, forum, chat room, or email messages;
even if you think it can’t be traced back to you. It can.
3. If You Wouldn’t Show it in Public, Don’t Share it Online- Naked sex pictures,
drunk pictures, unedited home video – if you have a problem with your boss,
your parents, your classmates seeing it now, or at any point in the future,
don’t post it online.
4. Don’t Exclude Your Audience- If you have an in-joke to share with one other
person, or a small number of people in a larger online group, send them a
private message. Don’t make everyone else feel left out by posting an
obscure comment to your status, forum, or Instagram story.
5. Don’t “Friend” the “Unfriend” People- No one believes you have 1,000
friends, but it is insulting to be dropped from someone’s friend list. Think
about it before adding them or accepting their invitation. If you don’t want to
be in touch with them, don’t add them in the first place. If you want to stay
in touch for professional reasons, tell them you only used Facebook for close
personal friendships, and join LinkedIn or another professional networking
site for more distant contacts.
6. Don’t Overload System Resources With Enormous Files- You might think that
sequence of nature pictures with inspirational statements is wonderfully
moving. It might give you a sense of serenity. But that is the last thing it will
give a person you email if it crashes their server, deplete their inbox quota so
their emails get bounced for a week before they realize, or uses up that last
bit of space they needed to complete an important assignment. So post it to
your own space and send people a link. Don’t attach it to an email.
7. Respect People’s Privacy- Don’t forward information sent to you without
checking the original sender first. Use BCC (blind carbon copy) rather than CC
(carbon copy) if you are sending something out to more than one person.
You might think that we are all friends online, but your friends may not want
their names and or emails addresses publicizes to people they do not even
know.
8. Don’t Repost Without Checking the Facts- That cure for cancer might sound
pretty impressive, but it will just cause upset if it is a hoax. And Urban myths
add to the noise of the internet and waste people’s time. If you aren’t sure of
the facts, email it to someone who does know or can find out. Or do a search
on Google.
9. Check and Respond to Email Promptly- By all means, ignore and delete
spam, unsolicited messages, and crazy stuff. But if you have given someone
your email address or if you are in position where people could be expected
to contact you and your email address is public, have the courtesy to reply to
their message within a few days. If it is going to take longer to reply, email
them and tell them that.
10. Update Online Information That People Depend Upon- Don’t leave
inaccurate information online just because you can’t be bothered to update
your website. If you are going to be unavailable, for example, don’t leave
your hours of operation online indicating you will be available. I you can’t
keep your website up to date, take it down.
Digital Divide, Addiction, and Bullying
Digital Divide
Digital divide could be a term that refers to the gap between demographics
and regions that have access to trendy info and technology, and people that do
not or have restricted access. Before the late twentieth century, digital divide
referred principally to the division between those with and without phone access.
The digital divide generally exists between those in cities and people in rural
areas; between the educated and the uneducated; between socioeconomic
groups; and, globally, between the more and less industrially developed nations.
Even among populations with some access to technology, the digital divide can be
evident in the form of lower-performance computers, lower-speed wireless
connections, low-er-priced connections such as dial-up, and limited access to
subscription-based content (Rouse, 2014)
Computer Addiction
A disorder in which the individual turns to the Internet or plays computer
games to change moods, overcome anxiety, deal with depression, reduce isolation
or loneliness, or distract themselves from overwhelming problems. The elderly, as
well as children and adolescents, are particularly vulnerable because they may not
realize the extent of their dependency. In many instances, individuals with
computer ad-diction may seek help for another condition, such as depression,
phobias or other addictions (Shiel, 2018).
Bullying
Stopbullying.org (2019) defines bullying as unwanted, aggressive behavior
among school aged children that involve a real or perceived power imbalance. The
behavior is repeated, or has the potential to be repeated, over time. Both kids who
are bullied and who bully others may have serious, lasting problems.
In order to be considered bullying, the behavior must be aggressive and
include:
• An Imbalance of Power: Kids who bully use their power such as physical
strength, access to embarrassing information, or popularity to control or
harm others. Power imbalances can change over time and in different
situations, even if they involve the same people.
• Repetition: Bullying behaviors happen more than once or have the
potential to happen more than once.
Bullying includes actions such as making threats, spreading rumors, attacking
someone physically or verbally, and excluding someone from a group on
purpose.
Types of Bullying
There are three types of bullying:
• Verbal bullying is saying or writing means things. Verbal bullying includes:
o Teasing
o Name-calling
o Inappropriate sexual comments
o Taunting
o Threatening to cause harm
• Social bullying sometimes referred to as relational bullying, involves hurting
someone’s reputation or relationships. Social bullying includes:
o Leaving someone out on purpose
o Telling other children not to be friends with someone
o Spreading rumors about someone
o Embarrassing someone in public
• Physical bullying involves hurting a person’s body or possessions. Physical
bullying includes:
o Hitting/kicking/pinching or Spitting
o Tripping/pushing or Taking or breaking someone’s things
o Making mean or rude hand gestures
What Is Cyberbullying?
Cyberbullying, according to stopbullying.com (2019), is bullying that takes
place over digital devices like cell phones, computers, and tablets. Cyberbullying
can occur through SMS, Text, and apps, or online in social media, forums, or
gaming where people can view, participate in, or share content. Cyberbullying
includes sending, posting, or sharing negative, harmful, false, or mean content
about someone else. It can include sharing personal or private information about
someone else causing embarrassment or humiliation. Some cyberbullying crosses
the line into unlawful or criminal behavior.
The most common places where cyberbullying occurs are:
• Social Media, such as Facebook, Instagram, Snapchat, and Twitter
• SMS (Short Message Service) also known as Text Message sent through
devices
• Instant Message (via devices, email provider services, apps, and social
media messaging features)
• Email
References:
Carol Ramoran, UP student plagiarizes prize-winning photos, Rappler, September 22, 2013, https://www.rappler.com/move-ph/39566-
up-student-admits-plagiarized-photos
Elizabeth Hartney, 10 Basic Rules of Netiquette or Internet Etiquette: Know Your Manners When Using Technology, VeryWellMind,
January 13, 2020, https://www.verywellmind.com/ten-rules-of-netiquette-22285
Janvic Mateo, UP grad in photo plagiarism gets redemption, The Philippine Star, December 2, 2015,
https://www.philstar.com/headlines/2015/12/02/1528420/grad-photo-plagiarism-gets-redemption
Laura Clark, Four in ten teenage girls „are addicted to internet‟: Youngsters increasingly showing signs of compulsion with their tablets
and smart phones,dailymail, May 9, 2014, https://www.dailymail.co.uk/news/article-2623903/Four-ten-teenage-girls-addicted-internet-
Youngsters-increasingly-showing-signs-compulsion-tablets-smart-phones.html
Margaret Rouse, Digital Divide, WhatIs, June 2014, https://whatis.techtarget.com/definition/digital-divideMarkus Spiske, Save Your
Internet – Demo against Uploadfilter – Article 13 #CensorshipMachine., Unsplash, March 16, 2019,
https://unsplash.com/photos/y6HpQzW87Vc
N. Mark Castro, Robert Blair Carabuena: A Case Study of Cyber Bullying, asmartrock, August 16, 2012,
https://asmartrock.wordpress.com/2012/08/16/robert-blair-carabuena-a-case-study-of-cyber-bullying/
Pixabay, Ios Icon Screengrab, Pexels, December 22, 2019, https://www.pexels.com/photo/applications-blog-blogging-blur-
267392/stopbullying.org, What is Bullying,
stopbullying.org, May 30, 2019, https://www.stopbullying.gov/bullying/what-is-bullyingstopbullying.org, What Is Cyberbullying,
stopbullying.org, May 30, 2019, https://www.stopbullying.gov/cyberbullying/what-is-it
subsri13, Cyber bullying red button on silver keyboard, Freepik, June 2019, https://www.techtarget.com/contributor
Margaret-RouseWilliam C. Shiel Jr., Medical Definition of Computer addiction, MedicineNet, December 11, 2018,
ACTIVITY SHEET IN MEDIA AND INFORMATION LITERACY
(Module 4)
Name: ________________________________________
Strand, Gr.& Section: ____________________________
Instructor: ___________________________
Activity 1:
Read the following articles on a case of plagiarism: “UP student plagiarizes prize-winning photos”
UP student plagiarizes prize-winning photosCarol Ramoran | September 22,
2013https://www.rappler.com/move-ph/39566-up-student-admits-plagiarized-photos
MANILA, Philippines (UPDATE) – A graduate student of the country‟s premier
state university admitted to passing off as his own a photograph that recently won a
contest sponsored by the Chilean ambassador.University of the Philippines graduate
student Mark Joseph Solis made the confession when Rappler contacted him by phone
on Sunday, September 22.“I‟m deeply sorry. I‟m in deep remorse. Right now, I already
contacted the organizers and I‟m about to contact the owner to personally convey to him
my deepest and personal apology,” Solis said.According to posts on the “Narinig ko sa
UP” (Overheard at UP) Facebook page, Solis had done this at least 5 times since
2011.The most recent photo that Solis claimed to be his won the top prize in the Smiles
for the World photo contest conceptualized by Chilean Ambassador Roberto Mayorga. It
came under intense scrutiny on social networks on Sunday after the real owner of the
photograph, Gregory John Smith, revealed how “an impostor... abused my
copyright.”Solis submitted a photo of a boy whom he said was named Nilo and was from
Zamboanga City. The caption stated that the boy helped his father farm seaweed.
During Chile‟s National Day on Wednesday, September 18, at the Cultural Center of the
Philippines, Solis was awarded $1,000 and roundtrip tickets to Chile and Brazil. Smith, a
social entrepreneur, said the photo belonged to the Children at Risk Foundation, which
he founded. The child in the photo was from Brazil, not Zamboanga City, he said.Smith
posted a comment on a recent feature article on the ambassador claiming ownership of
the photo.
Taken from Flickr
Smith pointed to his Flickr account, which contained the same photo – taken in
2006 – along with other photos of children in Brazil. The photo was titled, “Neptune, King
of the Sea.”UP students expressed shock and anger at the apparent plagiarism. Solis is
a political science alumnus of UP and is currently taking up his Masters in Public
Administration at the National College of Public Administration and Governance.
A. In what competition did Solis send in his plagiarized work?
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
B. Do you think technology and internet have made plagiarism easier? Do you think technology
has made people more or less creative? Explain your answer with examples.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
ACTIVITY 2
Answer the following.
1. What are the basic rules in protecting yourself online?
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
_____________________________________________________________
_____________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
_____________________________________________________________
_____________________________________________________________
2. Cite one example in your school or community of teenagers who have experienced computer
addiction. What happen them? Have they recovered from their addiction?
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
_____________________________________________________________
3. Give one suggestion to avoid cyber bullying. Give one suggestion to avoid being a cyber bully.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
_____________________________________________________________