M1S0: Review M1S1: Basic Concepts of Communication: Transmission of A Message From A Source To A Receiver
M1S0: Review M1S1: Basic Concepts of Communication: Transmission of A Message From A Source To A Receiver
- Harold Dwight Lasswell (1902-1978) - David Berlo (1921-1996) - In its simplest form, communication is the transmission of a
- “One of the earliest and most influential communication message from a source to a receiver. For more than 70
models.” years now, this view of communication has been identified with
the writing of political scientist Harold Lasswell (1948).
- He said that a convenient way to describe communication is to
answer these questions:
o Who?
o Says what?
o Through which channel?
SHANNON-WEAVER’S MODEL OF COMMUNICATION
BARNLUND’S TRANSACTIONAL MODEL OF COMMUNICATION o To whom?
- Claude Elwood Shannon & Warren Weaver (1916-2001) o With what effect?
- Dean C. Barnlund (1920-1992)
- “the mother of all communication models.”
Models of Communication
Levels of Communication according to Number of Participants - Transaction
- the ability to use digital technology, communication tools
or networks to locate, evaluate, use and create information
- the ability to understand and use information in multiple
formats from a wide range of sources when presented via
computers, or to a person’s ability to perform tasks effectively
in a digital environment
- the ability to read and interpret media, reproduce data and
images through digital manipulation, and evaluate and
Linear or Transaction Model of Communication
apply new knowledge gained from digital environments
What is Media Literacy? - “…the Media Information Literacy is a fusion of the various
- understanding and using mass media in either an information and media sources and incorporated with the
assertive or non-assertive way, including an informed and concept of literacy. The challenge therefore is how one will
critical understanding of media, the techniques they employ be able to equip himself/herself with the knowledge, skills, and
and their effects attitude required by these fields.” (Zaporteza, et al., 2018, p. 6).
print, radio, computers etc.) traditional media. With the acknowledgement of the need of
Interactive or Interaction Model of Communication - the ability to decode, analyze, evaluate and produce library, news, television literacy, the traditional conventions of
communication in a variety of forms. these media are now transforming into new forms” (Zaporteza,
et al., 2018, p. 6).
What is information Literacy? - “The role of media and information literacy in deepening
- the ability to recognize when information is needed and to democracy and good governance is crucial. Despite the
locate, evaluate, effectively use and communicate threats of sensationalism and superficiality, media as the
information in its various formats ‘fourth estate’ is still regarded by the society as the
watchdog, ‘guardian of public interest’, and a ‘conduit’
between the government and the people (Coronel, n.d.)…
What is Digital Literacy?
The responsibility of media and the role it has to play makes
- Broadcast Media Twitter audience overview - There was an erosion of traditional distinctions among
o reach target audiences using airwaves as the # of ppl – 386million media
transmission medium Share population – 6.4% - The co -existence of traditional and new media
o television and radio Advertising reach - +14% - The co -existence of print media, broadcast media (radio
Female – 39% and television), the Internet, mobile phones, as well as
- New Media (The Internet) Male – 69% others, allowing media content to flow across various
QQ, Qzone, Sina weibo, reddit, Pornhub, Yandexu, NF, Yahoo JP, o Learning management system
kuaishou, snapchat, twt, pinterest XNXX, Live, Amazon, WhatsApp, Google class, Edmodo
Naver, VK, Google BR
Facebook reach rankings Alexa - Advertisement/Commercial
India, USA, Indonesia, brazil, Google, YT, Tmall, FB, Baidu, QQ, o Product Advertisement
Mexico, PH, Vietnam, Thailand, Sohu, Login Tmall, Taobao, Yahoo, Digitalized print ads across different
Egypt, Bangladesh, Pakistan, 360, JD, Wikipedia, Amazon, Sina, platforms
turkey, UK, Colombia, France, Weibo, Pages Tmall, Live, Reddit,
NF - News
o News Agency ‘average’ people were all those who did not hold the o For example, our perception of things is affected
A newspaper that still publishes through print superior tastes and values of the mass society by our culture. That’s why we should remember that
and have online portal (website, apps, theorists”. For example, if you are not a politician our opinions vary from one culture to the other.
others) with multimedia contents then you are not expected to understand politics.
o “…but clearly not all average people were - Meaning-Making Perspective
- Entertainment mindlessly influenced by the evil mass media. o “…active audience members use media content to
o Multimedia personality People made consumption choices. They interpreted create meaning, and meaningful experiences, for
A person who has a television show, content, often in personally important ways. Media did themselves. Naturally, this use can produce important
publishes books, launches music record, have effects, often good ones. No single theory could macro-level, or cultural, effects as well. Cultural and
appears in movies, endorses commercial encompass the wide variety of media effects claimed making-meaning theories, taken together, make a
products peddles product line, has a digital by mass society theorists”. most powerful case for becoming media literate.
multimedia game, concerts etc They argue that who we are and the world in which
- Limited Effects Theory we live are in large part of our own making.”
o “…the first systematic and scientific study of media
Media Effects [MLCM] effects” composed of several other theories. o Symbolic Interaction
o “media influence was limited by individual Idea that people give meaning to symbols,
- Mass media enables mass communication. And with the
differences (for example, in intelligence and which then control people’s behavior in their
new/digital media, mass communication occurs everywhere
education), social categories (such as religion and presence
and every time to everyone. It is then unarguable that “media
political affiliation), and personal relationships (such
have effects. People may disagree about what those effects
as friends and family).”
might be, but media do have effects. Advertisers would not
o Social Construction of Reality
spend billions of dollars a year to place their messages in the
- Cultural Theory Theory that cultures construct and maintain
media if they did not have effects” (p. 315). Let’s then take a
o “…our experience of reality is an ongoing, social realities by using signs and symbols; people
look at the major theories explaining the effects of
communication as well as some of the well-known arguments construction, not something that is only sent, learn to behave in their social world through
of media effects. delivered, or otherwise transmitted by one authority or interaction with them, as those mutually
elite (Baran & Davis, 2015, p. 309 as cited in Baran, negotiated meanings allow members of a
- Mass Society Theory 2021). culture to better know one another and
o “…the idea that the media are corrupting influences o “…meaning and, therefore, effects are negotiated predicts interaction and behaviors
that undermine the social order and that ‘average’ by media and audiences as they interact in the
- Check for citations. - Reliability o If yes, would the change have any effect on the
o Reliable authors have the discipline of citing o What are the details of this piece of news? conclusion of the article?
Work 50 years from publication for any other purpose to an extent that will prejudice o Under the Republic Act 10175, also known as
the rights of the copyright owner in the work; or Cybercrime Prevention Act of 2012, these are
o Audio-Visual o trade exhibit of the article in public some of the punishable cybercrime offenses here
in the Philippines: cyber-squatting, cybersex, child
Work 50 years from publication
- “Under Philippine law, copyright infringement is punishable pornography, identity theft, unsolicited electronic
by the following: communication, and libel. [UCCCICP]
o Sound Recording
50 years from year recording took place
o Unsolicited Commercial Communications destroy reputation, and deprive others “Phishing is a criminal act to
the transmission of commercial from registering the same acquire sensitive information,
electronic communication with the use of such as usernames, passwords,
computer system which seek to advertise, o Identity Theft web site details and credit card
sell, or offer for sale products and services the intentional acquisition, use, misuse, accounts, by masquerading as a
are prohibited unless “there is prior transfer, possession, alteration or trustworthy entity in an electronic
consent from the recipient, the deletion of identifying information communication”
communication is an announcement from the belonging to another, whether natural or
sender to users, and if there is an easy, juridical, without right - Anti Cybercrime Group
reliable way for the recipient to reject it, o As summarized by the Philippine Daily Inquirer in their
among others” (Philippine Daily Inquirer, o Libel 2014 article “In the Know: The cybercrime law”,
2014, In the Know: The cybercrime law) this is “a public and malicious imputation The cybercrime law could see Internet
of a crime, or of a vice or defect, real or users sentenced to up to 12 years in
o Cybersex imaginary, or any act, omission, condition, prison for posting defamatory comments
the willful engagement, maintenance, status, or circumstance tending to cause the on Facebook or Twitter.
control, or operation, directly or indirectly, dishonor, discredit or contempt of a Individuals found guilty of cybersex face a
of any lascivious exhibition of sexual natural or juridical person, or to blacken jail term of prison mayor (6 years and one
organs or sexual activity, with the aid of a the memory of one who is already dead” day to 12 years) or a fine of at least
computer system, for favor or consideration (Article 353 of the Revised Penal Code) P200,000 but not exceeding P1 million.
Child pornography via computer carries a
o Child Pornography o Computer-related Fraud penalty one degree higher than that provided
the unlawful or prohibited acts defined and the intentional and unauthorized input, by RA 9775, or the Anti-Child
punishable by Republic Act No. 9775 or the alteration, or deletion of computer data or Pornography Act of 2009. Under RA 9775,
Anti-Child Pornography Act of 2009, program or interference in the functioning of those who produce, disseminate or publish
committed through a computer system a computer system including, but not limited child pornography will be fined from P50,000
to, phishing, causing damage thereby, with to P5 million, and slapped a maximum jail
o Cyber-squatting the intent of procuring an economic benefit term of reclusion perpetua, or 20 to 40
the acquisition of a domain name over the for oneself or for another person or for the years.
internet in bad faith to profit, mislead, perpetuation of a fraudulent or dishonest Persons found guilty of unsolicited
activity communication face arresto mayor
(imprisonment for 1 month and 1 day to 6 those who have an internet connection and one’s reality or the ideal version of that
months) or a fine of at least P50,000 but those who do not have the means to avail for person.
not more than P250,000, or both. one. Moreover, “a deeper perspective also It is best to remember, however, that it is
lies on those who may have access on it but never right to deceive, mislead, hurt,
- The Moral and Social Dimensions of Media and cannot use it, not because they do not own a and/or harm other people through our
Information form of technology, but because they do not created virtual self. It is also best to know
o Cyberbullying have any knowledge on how to use it to its and practice network etiquette or
Cyberbullying, as defined by House Bill fullest potential” (Zaporteza, et al., 2018, p. “netiquette”.
5718, is the act of posting rude, offensive 69). Netiquette is a guiding principle on how
or insulting messages against a victim on to properly connect with other people
the internet. There is a very partial distribution of digital online.
A specific law covering cyber bullying is still resources making the production,
pending in Congress. However, victims of consumption, and utilization of digital
cyber-bullying still have other remedies information and the presence of the digital
under the current laws of the Philippines. highway pervasive only in selected areas of
Posting online of malicious and/or the world and even in the selected areas of M2: Formative Questions
defamatory words against another person is the country.
The challenge of digital divide is not just on These are among the five components of information literacy
punishable under the Revised Penal
the accessibility to the available EXCEPT…- Discuss and Accept
Code and the Cybercrime Prevention Act.
Victims may report the bullying to the police. technology. A deeper perspective also lies Information literacy aims to develop and strengthen… - Critical
If the victim decides to file a criminal case on those who may have access on it but thinking
against the offender, the police or a lawyer cannot use it, not because they do not own a
This is the first stage/element of information literacy. -
can help in the preparation of the form of technology, but because they do not
Identifying/recognizing information needs
complaint. have any knowledge on how to use it to its
fullest potential. Michael Jordan is the greatest basketball player ever to have played
o Digital Divide the game. This is an example of… - Interpretation
is a division between people due to o Virtual Self and Netiquette
Rodrigo Duterte was elected as the Philippine President in 2016.
difference in technological or digital Virtual self pertains to how people
This is an example of - Common Knowledge
availability or accessibility. In the represent or portray themselves in the
Philippines, this is very evident between virtual world. It can either be the replica of a
When using someone’s words directly, do the following EXCEPT - This is the least reliable URL among the group - .com Marshall McLuhan’s “the medium is the message” means that - The
add your own interpretation way we send and receive information is more important than the
These are examples of licensed digital platforms for latest and
information itself.
This is the last stage/element and the most important part of media archival news, researches, journals, and academic subject areas
and information literacy. – Create EXCEPT – HootSuite These are examples of local bookstores and publishers that can be
used as reference EXCEPT - McGraw-Hill
Media literacy scholar Renee Hobbs recommends answering this This is the reason why ignoring indigenous media and information
question when making a media choice. - What is omitted or left out can result in development and education programs that are irrelevant This is the reason why ignoring indigenous media and information
in the presented media? & What deceptions are used in the presented and ineffective. – The programs created may not address the needs of can result in development and education programs that are irrelevant
media? the community & may not be suitable to the culture and traditions of and ineffective. - The programs created may not be suitable to the
the community culture and traditions of the community. & The programs created
This is the main reason why internet access is a basic human right
may not address the needs of the community.
as declared by the United Nations in July 2016. - Everyone should be This kind of knowledge is unique to a specific culture or society;
able to seek, receive, and impart information and ideas. most often it is not written down – Indigenous knowledge Streaming an unauthorized version of the Titanic violates this factor
of fair use. – Effect on the market
This is using someone’s ideas but rephrasing them in your own These refer to the codes, conventions, formats, symbols, and
words. – Paraphrase narrative structure that indicate the meaning of media messages to an Educational uses of media falls under this factor of fair use. - Purpose
audience – Media Languages and character of the work
This kind of information no longer requires citations – Common
Knowledge These codes include ominous music to communicate danger in a This cybercrime refers to the intentional acquisition, use, misuse,
feature film or high-angle camera shots to create a feeling of power in a transfer, possession, alteration, or deletion of identifying information
According to media literacy scholar Julie Coiro, these are the things to
photograph – Technical codes belonging to another, whether natural or juridical, without right. Group of
consider when evaluating the quality and credibility of the media
answer choices - Identity theft
being consumed EXCEPT – Bias Marshal McLuhan is a – Communication Theorist
Republic Act 8293 is also known as - Intellectual Property Code of
These are examples of creating media EXCEPT – Both creating GIF An important first step in becoming a media and information literate
the Philippines
and posting to social media is to – understand how information, ideas and meaning are
communicated through and by various media and other information According to a survey last April 2020, this is the percentage of
This is one importance of creatin your own media in connection to
providers and that the different media platforms have their own Filipino internet users aged 16 to 64 who say that they are worried
media and information literacy – Develop skills in analysing and
‘languages’ or ‘grammars’ that works to convey meaning in a unique about how companies use their personal data. – 64 %
evaluating media
way
Individuals found guilty of cybersex face a jail term of prision mayor
Libraries of published books are often considered highly reliable,
This is something everyone is not capable of doing before the 21 st
which is equivalent to - imprisonment for 6 years and one day to 12
accurate, and valuable because – Books and documents from
century. The digital age gave this power and opportunity for everyone. – years
dominant sources are often peer perceived
Producer’s of information
This is a word, a group of words, sign, symbol, or a logo that Photocopying portions of a book for personal use is an act of – Not Third is the amount of the piece used from the copyrighted work.
distinguishes your business’ goods or services from those of other an act (?) or could be fair use If the use employs a tiny proportion of the copyrighted work, it’s more likely to be deemed fair.
traders. – Trademark Fourth is the effect of the use on the market for the copyrighted work.
Photocopying portions of a book for selling – Copyright
So, streaming a bootleg version of Titanic isn’t fair, because it directly competes with lawful
The cybercrime law could see Internet users who are posting infringement streaming services.
defamatory comments on Facebook or Twitter sentenced to up to – But your version of Titanic that replaces all the characters’ voices with chipmunk sounds –
This pertains to how people represent or portray themselves in the
12 years in prison that’s unlikely to “compete” for the attention of people looking to watch the original.
virtual world. – virtual self But, Fair Use isn’t the only way that media is allowed to be adapted by the public.
Posting online of malicious and/or defamatory words against [Theme Music] There’s an expanse of media works that are available in the public domain.
another person which is a common form of cyberbullying is punishable The media economy is ruled by profits, yes, but also by the governments and industry This is the set of all works whose copyright has expired and are free to use by anyone.
under the - Revised Penal Code and the Cybercrime Prevention Act organizations who set out to regulate it.
Characters like Robin Hood and Sherlock Holmes are in the public domain.
Just as the big media companies need to follow certain rules, so do media consumers (that’s you).
So between Copyright, Fair Use, and Public Domain – you have the three pillars of
Digital divide refers to the gap between - those who have access and Over the past few years many media-related laws have had to adapt dramatically to Intellectual Property in everyday media.
knowledge in using technology and the Internet and those who do not changing times and incredible leaps in technology.
Seems pretty cut and dry, right?
those who have access to technology and the Internet and those who One such law you’ve probably heard a lot about is copyright.
Well, it kind of was before the internet.
Copyright gives creators of media the exclusive rights to their creations.
do not Before many more people had the ability to use copyrighted material at the speed of light.
They can copy, modify, distribute, or show off their works however they want.
During the 1990s, established media corporations, like the music industry, began to get real
This is how UNESCO (2011) defined information literacy. - the Others need to get permission to use them. upset about the way the internet was challenging the status quo.
ability to recognize when information is needed and to locate, This helps creators make money from and get credit for their work. Media was getting copied and shared and moved around faster than ever before – and they
wanted to stop it.
evaluate, effectively use and communicate information in its various But a copyright isn’t a total monopoly on a work.
This all culminated in the 1998 Digital Millennium Copyright Act or DMCA.
formats Thanks to the notion of fair use, the public can exercise its first amendment rights by using
others’ work without permission. You might have heard of the DMCA.
When we study media languages, these questions should be That is, as long as it transforms the work in some way. It does a LOT of things, but one obvious thing it does is give copyright holders the ability to make
claims against content on digital platforms.
considered EXCEPT – who will consider these useful? In fact, there are four factors courts use to determine whether a use is fair.
In fact, once it was enacted, The Record Industry Association of America even targeted young
First is the purpose and character of the work. internet users who downloaded copyrighted materials with lawsuits.
These are the words of Marshall McLuhan that provide a good
Many educational uses of media, like showing a film in class, are protected under fair use And if you’ve ever seen a YouTube video vanish beneath an “infringing content claim” –
explanation as to why it is important to understand media languages.- “It because they’re not for commercial purposes. that’s thanks to the DMCA.
is impossible to understand social and cultural changes without a Other protected uses are criticism, commentary (like parody), research and scholarship. So, in this brave new world of digital media and pop music anime lip sync mashups, how DO you
know if your use is fair?
knowledge of the workings of a media.” Second is the nature of the copyrighted work.
Let’s head into the Thought Bubble to find out.
Copyright law is meant to encourage creative expression.
These refer to the codes, conventions, formats, symbols, and Let’s say you want to make a montage video of your two favorite characters from your favorite TV
You can’t copyright facts, but you can copyright something you imagined. show: Archie and Veronica from Riverdale.
narrative structures that indicate the meaning of media messages to
Creative media like a movie or a song, something that takes imagination, is more difficult to use (Apologies to Barchie or Beronica shippers.)
an audience. - Media languages fairly.
You pull together cute clips from the show and pop on your favorite Taylor Swift song – Love Story,
But with fact-based media, like news articles or a documentary, there are more options for fair use, obvs – in the background.
Marshall McLuhan is a - Communication theorist like education or parody.
Now is it fair use? Now they have that drawing, and when they look at it...they uh – you get what I’m saying. Online that includes our browsing habits and history, plus the personal information we share with
all the websites and apps we use.
First step: what’s the purpose and character of your work? It’s no surprise that nowadays, young people might use their phones to “communicate” in
relationships, rather than paper and charcoal. Traditionally, privacy has determined what information was allowed to be used in court cases.
Your purpose is to get all the likes, but also to prove that Varchie is the OTP.
The only problem is: what about the law? Some private information was protected from unlawful search and seizure.
You’re not in it for the money and the video itself is commentary on Riverdale.
First. Most states in the US define the age of consent. But of course, the internet threw a wrench in that, too.
Ok, that could pass.
If two teenagers above the age of consent want to meet up in the back of a car – there’s nothing If you use a social media in the public setting, where anyone can access your posts, is that public
Second: what’s the nature of the copyrighted work? illegal about that. or private?
The TV show and the song are definitely creative and not fact-based, so yeah, that’s a strike. BUT in the US there are also laws against the production, possession, or distribution of child What about if you use the app in a private setting, for just your friends and family?
pornography –
Like I said, it’s harder to use an imaginative work like a movie or a song. What if you share your private thoughts on an anonymous, public blog?
ANY visual depiction of explicit content involving someone under 18.
Third: How much did you use of the show and the song? On top of these shifting notions about what constitutes privacy online, protections for accessing
Good laws. Important laws. Super important and good laws. that data are even less clear.
You definitely only used clips of the show, a couple of seconds each of a whole season of TV.
The problem comes from figuring out what happens when the legal sexual relationships between When and where law enforcement can request or demand access to phones, computers and social
That would probably get a pass. two teenagers – media accounts is often a grey area.
But you did use the whole song – that’s not cool. over the age of consent, but still under 18 – when those relationships start to involve, you know, And when they do, what are their rights to privacy?
sexy pictures.
Strike two. Gen Z will be the first generation to live their lives on smartphones from such a young age.
Because technically – according to U.S. law – that can be classified as child pornography, and
Finally: what effect would your work have on the market for the works you used? there are already many examples where young people have been charged as such. Think of all the data they’re sharing about themselves before they’re able to walk home alone, let
alone drive or vote.
Since someone couldn’t reasonably watch your clip video instead of watching the full Riverdale And these laws are meant to protect children from sexual abuse.
series on TV, that’s probably fair use. Will that data follow them around, forever?
Federal laws carry mandatory minimum sentencing of five years in prison and registry as a sex
But someone could just listen to your video instead of buying that Taylor Swift song. offender for related charges. How would you feel if your first AIM screen name or all the Snapchats from your awkward years
followed you around forever?
Sorry, no matter how perfectly “Love Story” encapsulates Archie and Veronica’s relationship, you’re These are huge consequences!
not transforming the song. One response to this problem will take effect in Europe in May 2018.
Because of this, some states have recognized sexting as a widespread practice and have reduced
In fact, you’re using it in a pretty normal way, like in a movie – except movies pay to use a song charges accordingly. The European Union’s General Data Protection Regulation (or the GDPR for short) is a big, big
on the soundtrack. deal.
But there’s still a grey area, however, between federal and state laws and local jurisdictions
So, while the montage of clips you made may be transformative, the use of the song wouldn’t be This legislation will impact all of the European Union, affording a stricter right to protect yourself
considered fair use. – including whether police are allowed to search a teen’s phone. online.
As you can see, the notion of “fair use” isn’t cut and dry. The point is, these are laws that were made before our current media moment, colliding with what Part of this law, the Right to be Forgotten, will make it easier to get rid of personal information that’s
has become everyday practice. been collected about you and make clear what that data is, too.
It’s like a puzzle that changes for every person who tries to solve it.
And the outcome often comes down to a discussion or a judgement call – often by people who are, But since this legislation affects multinational corporations like Google and Facebook, the
Thanks, Thought Bubble! let’s say, not the most plugged in with “kids these days.” ramifications won’t be stuck on the other side of the pond.
The thing that makes the DMCA, and intellectual property generally, interesting is that it shows It might not be the most fun to talk about. The industry titans are expected to follow suit across the globe to ensure they remain compliant.
laws trying to play catch up with how media has changed due to technology.
But these gaps – between current media practices and traditional laws – are already impacting Clearly, we’ve entered a new paradigm where our technology is outpacing legislation.
And many of the old definitions and approaches start to grind when used in this new media people’s lives.
ecosystem. As laws and regulations continue to develop around our fast-paced digital world, the only solution is
From copyright laws to sexting and cyberbullying, our online lives have posed some serious to stay vigilant.
Some challenges to media laws are more high-stakes than Taylor Swift montages. challenges to our legal system.
Know what data you’re sharing.
Get your giggles out now, kids, cause I’m about to talk to you about “sexting.” And many of these questions are still up for debate. Be careful of downloading or sharing others’ work online.
And remember that your words and your images have meaning, and can be used
So. Urban Dictionary defines “sexting” as...oh. Oh my. Ah. But maybe none of these have been as tough to deal with as the issue of online privacy. against you.
Next time on Crash Course: Media Literacy we’ll talk all about how bad actors can use those
Let’s just say that sexting is like...when two people really like each other, and so one of them draws Privacy refers to the access, collection and sharing of personally identifiable information. vulnerabilities against us through propaganda and misinformation.
the other naked.
You’ll need the skills we learned today to dive into the dark side of media.
Crash Course Media Literacy is filmed in the Dr. Cheryl C. Kinney Studio in Missoula, MT,
and it’s made with the help of all of these nice people and our animation team is Thought Cafe.