Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

MITS01C

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 27

SUB-QUARTER C INSTALLMENT

MEDIA &
INFORMATION
LITERACY
MODULE GUIDE FOR STUDENTS
©ISAAC GARCUA

L eum h hi pines University– Cavite


City of General Trias
Don't promote negativity online and expect people to treat you with p
— Germany Kent

Photo courtesy of CHAD MADDEN


This set of modules was prepared by Mr.
Fercie Bon C. Usita, a form er Sen i o r
High School faculty member of the LPU
International School. The author of the
modules may be different f rom your actual
subject teacher. Please refer to the Class
Orientatiom Kit for details and instructions
f rom your sub- ject teacher.
A C A DEM I C I N T E G R I T Y

noun l ac·a·dem·ic in·teg·ri·ty| \ ˌa-


kə-ˈde-mik in-ˈte-grə-tē \
1. Students are expected to be honest in preparing and
submitting their outputs. They must cite sources or references
for any materials included in their output. They are also
expected to report accurate data or results in
experiments, surveys, reports and other ac- ademic
activities.
2. The University shall strictly implement guidelines con-
cerning academic integrity stipulated in the Student
Handbook.
3. Any form of academic dishonesty, including, but not
limited to, plagiarism and cheating, will be properly
addressed through various academic dishonesty pre-
vention system that is available in the University, in-
cluding, but not limited to, student disciplinary guide-
lines.
4. Teachers, aided by approved tools such as anti-
plagiarism software (e.g. Turnitin) or websites (e.g.
www.grammarly.com), shall impose corrective
measures to students who will submit outputs, which are,
in full or in part, plagiarized or taken from an- other
students’ work. Such measures shall be included in the class
orientation kit and must consistently be mentioned in
instructions for required submissions. The following may
serve as guide:
 20% and below – acceptable
 21 to 40% - with deductions
 41 to 100% - zero grade for the output.
The student/s will be reported to the
Student Formation Officer for disciplinary
action.

LPUCAVITE
The use, disclosure, reproduction, modification and/or transfer of this
document for any purpose, in any form or by any means without approval from
Lyceum of the Philippines University Cavite is STRICTLY PROHIBITED, and may
be subject
to disciplinary and/or legal sanctions.
©ANASTASE MARAGOS

Legal, Ethical, and

6
LESSON
SocietalIssues in
Media and Infor-
mation

T his module covers the knowledge, skills and attitudes required to “Legal, Ethical, and Societal Issues in Media and
Information”. Define and explain copyright and other related issues, discuss the difference between copy- right infringement
between plagiarism. Discuss current issues related to copyright in relation to actions of govern-
ment and private sectors, including but not limited to Cybercrime Law RA10175, identify the different types of bully- ing.
Explain actions to promote ethical use of media and information, applying the 10 Basic Rules of Netiquette or Internet
Etiquette Know Your Manners When Using Technology
1 LESSON 6.1 COPYRIGHT, PLAGIARISM & FAIR USE
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE

RECAP: Our previous lesson class was about Media and Information Languages. Under this lesson we discussed the Media Lan-
guages, Codes, Conventions, and Messages, Audiences, Producers and Other Stakeholders. In codes or conventions, we follow
standards like traffic signs if green means go then if it is red meaning stop. So for the next lesson we will take up copyright/fair
use/plagiarism for another standard to be followed. This lesson is equivalent to ONE (1) regular class week.

L E A R N I N G O BJ E CT I V E S KEY T E RMS

At the end of the lesson, the learners must be able to: COPYRIGHT

1. put into practice their understanding of the intellectual prop- PLAGIARISM


erty, copy right, and fair use guidelines CYBERBULLYING
2. discuss current issues related to copyright vis-à-vis LAPTOP ADDICTION
3. explain copyright, fair use, etc.vis-a-vis human rights DIGITAL DIVIDE

CO RE C O NT E NT

DEFINITION
OF TERMS
1. Copyright - a legal device that
provides the creator of a literary,
©FREEPICK.COM

artistic, musical, or different


inventive work the only real
right to publish and sell that job.
Copyright own- ers have the
proper to man-

age the copy of their work, together with the proper to receive payment for that reproduction. Violation of
a copyright is named infringement.
2. Plagiarism - an act or instance of victimization or closely imitating the language and thoughts of
another author while not authorization; the illustration of that author’s work as one’s own, as by not
crediting the first author.
3. Cyber Bullying - bullying that takes place on-line, or victimization electronic technology like cell
phones, computers, and tablets over communication tools together with social media sites, text messages,
chat, and websites. Samples of cyber bullying: text messages or emails com- posed to insult or demean;
rumors or false statements unfold by email or denote on social net- working sites; and undignified photos,
videos, websites, or faux profiles deliberately shared across social media.
4. Laptop Addiction - the excessive use of computers to the extent that it interferes with standard of
living, particularly in using technological device. This excessive use could as an example in- terfere with
work or sleep, lead to issues with social interaction, or have an effect on mood, re- lationships, and
thought processes.
5. Digital divide - an economic difference between teams in terms of access to, use of, or data of ICT. The
divide inside countries (such because the digital divide within the United States) will check with inequalities
between people, households, businesses, and geographic areas at com- pletely different socioeconomic (and
different demographic) levels. The worldwide digital di- vide designates countries because the units of
study and examines the divide between develop- ing and developed countries on a global scale.

Lesson 6.1 l Continue on Page 2


2 LESSON 6.1 COPYRIGHT, PLAGIARISM & FAIR U

PLAGIARISM
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE

ARE YOU ONE OF THEM?

A
s one who consumes the day with an hour or two scrolling through different social networking sites online,
how many times have you shared contents that are not legally yours? By sharing, it could mean uploading a
new profile picture in Facebook that is taken from other people’s phone, repro-
ducing other user’s funny memes in your personal timeline, and getting quotes from Google.com and use it for your daily
Instagram stories? Were those instances warranted with the consent of the original owners or the authors? Have you
properly cited your sources whenever you answer essay questions in your assessments, or you deliberately neglect doing
so, so the answer will sound as if it came from your personal comprehension? How many times do you think you
committed plagiarism in your life?

Plagiarism defined, it is an act or instance of victimization or closely imitating the language and thoughts of
another author with no authorization; the illustration of that author’s work as one’s own, as by not crediting the first author.
In layman’s term, plagiarism is the act of taking another person’s ideas, writings,
inventions, and other similar intellectual
products as one’s own without
knowledge, consent and/or accreditation
of the original owner. It’s a grave miscon-
duct among users of information as it not only
discredits their authority as a source of
information, but plagiarism subjects them to be
©PURE JULIA

liable of copyright infringement— a


criminal offense punishable by the law.
However grave it may be, many are still
low-key in plagiarizing ideas and works of
other people, saying that they are unaware of its
grounds and that they do not intend to
complicate it that way since they are just
“sharing” information. As students taking Media
and Information Literacy, our goal is to raise
awareness about the risks of pla- giarism and
to promote the responsible and ethical use of
information around us. Let us not be one of
them.
Copyright, on the other hand, is a
legal device that provides the creator of a
literary, artistic, musical, or different in-
ventive work the only real right to publish and
sell that job. It’s a classification of intel- lectual
property right that gives the owner right in
using his creative intellectual facul- ties to
produce something and claim it as his own,
together with Trademark Rights and Patent
Rights. In the Philippines, RA 8293, or the
Intellectual Property Code of the Philip- pines
gives account to these rights. Lesson 6.1 l Continue on Page 3
3 LESSON 6.1 COPYRIGHT, PLAGIARISM & FAIR U
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE

Meanwhile...
The following table enumerates the scope of the copyright or the right provided to the owner of literary and/ or artistic
works, as well as the period of the validity of such right as prescribed by RA 8293.

COPYRIGHT VALIDITY PERIOD

LITERARY WORKS During the lifetime of the author plus 50 years after death

ART 25 years from the date of creation

PHOTOGRAPHIC WORK 50 years from publication

AUDIO-VISUAL WORK 50 years from publication

SOUND RECORDING 50 years from year recording took place

BROADCAST RECORDING 20 years from date of broadcast

The same law accounts the validity period of two other intellectual property rights such as the Trademark Rights
and the Patent Rights.

Valid for 10 years and may be renewed for a periods of 10


TRADEMARK
years

INVENTION PATENT Valid for 20 years from filing date application

Students!
This photo right here was plagiarized by a graduate s tudent of the Univer
$1,000. Catch-up with the details about this case in th e next page!

Lesson 6.1 l Continue on Page 4


4 LESSON 6.1 COPYRIGHT, PLAGIARISM & FAIR U
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE

PLAGIARISM CASE 101


READING ACTIVITY
Read the following article on a case of plagiarism: “UP student plagiarizes prize-winning photos”

Lesson 6.1 l Continue on Page 5


5
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE

LESSON 6.1 COPYRIGHT, PLAGIARISM & FAIR USE

READING COMPREHENSION
A. In what competition did Solis send in his plagiarized work?
B. What sanctions did he receive from the organizing committee? Describe his actions

.
C. Do you think technology and internet have made plagiarism easier? Do you think technology has made peo - ple more or
less creative? Explain your answer with examples.

WHAT IS FAIR USE?


FAIR USE refers to the limitation and to the exclusive right granted by copy-
right law to the author of a creative work. Fair Use, in other words somewhat
provides immunity to the members of the community in their attempt to use the
copyrighted work for statement, search engines, criticism, news coverage, re- search,
teaching, library archiving and scholarship purposes. Once a person is protected by Fair
Use, he will not be subjected to copyright infringement, unless proven otherwise.
6 LESSON 6.1 COPYRIGHT, PLAGIARISM & FAIR U

ETCETER
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE

OTHER TYPES OF INTELLECTUAL PROPERTY

Aside from Copyright, the law also protects the Patent rights and the Trademark rights of
other intellectual properties.
1. A Patent is an exclusive right granted for an in-
2. A Trademark is a sign capable of distinguishing the
vention. Generally speaking, a patent provides the
goods or services of one enterprise from those of other
patent owner with the right to decide how - or whether
enterprises. Trademarks date back to ancient times when
- the invention can be used by others. In exchange
craftsmen used to put their signature or "mark" on their
for this right, the patent owner makes technical
products.
information about the invention publicly available in
the published patent document. For instance, the photos ™ means the owner of the mark has common law rights
below illustrates the patent application of the Coca- even though the mark has not been registered while the
Cola bottle and cap by the Coca-Cola Company and ®, on the other hand, is only used for marks that
the first model of the telephone by Alexander have been granted registration. Below are logos of
Graham Bell. commercial franchises that are protect- ed with
Trademark Rights.

Figure 1. Patent Application of Coca-Cola Bottle and Cap Figure 3. McDonalds logo with a ™ attached to it.

Figure 3. Starbucks logo with ® attached to it.


Figure 2. Patent Application of the First Telephone Device Lesson 6.1 l Continue on Page 7
7 LESSON 6.1 COPYRIGHT, PLAGIARISM & FAIR U
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE

REVIEW YOURSELF!
Copyright is a legal device that provides the creator of a literary, artistic, musical, or different inven
Plagiarism is an act or instance of victimization or closely imitating the language and thoughts of an
Cyberbullying is a type of bullying that takes place on-line, or victimization electronic technolo
Laptop Addiction is the excessive use of computers to the extent that it interferes with standard o
Digital divide is an economic difference between teams in terms of access to, use of, or data of IC

Multiple Choice. Write your correct answer in the space provided. Choose the correct let-
ter only.

1. What sanctions did Solis receive from the organizing committee? A. Manage a foot- ball
program B. Forfeit his award C. Personal Apology D. Awarded $1000 roundtrip ticket

2. Using electronic technology such as cell phones, computers, and tablets over commu-
nication tools including social media sites, text messages, chat, and websites. A.
Copyright B. Plagiarism C. Cyber Bullying D. Computer addiction

3. An economic inequality between groups in terms of access to, use of, or knowledge
of ICT. A. Digital divide B. Plagiarism C. Cyber Bullying D. Computer addiction

4. An act or instance of using or closely imitating the language and thoughts of another
author without authorization A. Copyright B. Plagiarism C. Cyber Bullying D. Computer
addiction

5. The excessive use of computers to the extent that it interferes with daily life. This ex-
cessive use may for example interfere with work or sleep, result in problems with
social interaction, or affect mood, relationships, and thought processes. A. Copyright
B. Plagiarism C. Cyber Bullying D. Computer addiction

6. In what competition did Solis send in his plagiarized work? A. Photo of a boy B. Dur- ing
Chiles National Day C. Smiles for the World D.Neptune, King of the Sea

7. A legal device that gives the creator of a literary, artistic, musical, or other creative
work the sole right to publish and sell that work. A. Copyright B. Plagiarism C. Cyber
Bullying D. Computer addiction

R Mateo, J. (2015, December 3). UP grad in photo plagiarism gets


redemption. Philippine Star newspaper homepage
philstar.com. Retrieved from http://www.philstar.com/
headlines/2015/12/03/1528420/ grad-photo-plagiarism-
Starr, L. (2015). Is Fair Use a License to Steal? Re-
trieved from http://www.educationworld.com/
a_curr/ curr280b.shtml#sthash.qaat0Dud.dpuf

gets-redemption
A C A DEM I C I N T E G R I T Y
noun l ac·a·dem·ic in·teg·ri·ty| \ ˌa-
kə-ˈde-mik in-ˈte-grə-tē \
1. Students are expected to be honest in preparing and
submitting their outputs. They must cite sources or references
for any materials included in their output. They are also
expected to report accurate data or results in
experiments, surveys, reports and other ac- ademic
activities.
2. The University shall strictly implement guidelines con-
cerning academic integrity stipulated in the Student
Handbook.
3. Any form of academic dishonesty, including, but not
limited to, plagiarism and cheating, will be properly
addressed through various academic dishonesty pre-
vention system that is available in the University, in-
cluding, but not limited to, student disciplinary guide-
lines.
4. Teachers, aided by approved tools such as anti-
plagiarism software (e.g. Turnitin) or websites (e.g.
www.grammarly.com), shall impose corrective
measures to students who will submit outputs, which are,
in full or in part, plagiarized or taken from an- other
students’ work. Such measures shall be included in the class
orientation kit and must consistently be mentioned in
instructions for required submissions. The following may
serve as guide:
 20% and below – acceptable
 21 to 40% - with deductions
 41 to 100% - zero grade for the output.
The student/s will be reported to the
Student Formation Officer for disciplinary
action.

LPUCAVITE
The use, disclosure, reproduction, modification and/or transfer of this
document for any purpose, in any form or by any means without approval from
Lyceum of the Philippines University Cavite is STRICTLY PROHIBITED, and may
be subject
to disciplinary and/or legal sanctions.
9 LESSON 6.2 THE NETIQUETTE
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE

In our previous lesson class we discussed the Copyright, Plagiarism, Fair Use, Cyber bullying, and Computer Addiction. What is
the difference of being charge by copyright infringement and plagiarism? What are the different types of bullying? At this point
we will learn the core rules of Internet Etiquette or so is called the Netiquette. This lesson is equivalent to 2 class meetings.

L E A R N I N G O BJ E CT I V E S KEY T E RMS
At the end of the lesson, the learners must be able to: NETIQUETTE
1. demonstrates proper conduct and behavior online RULES OF NETIQUETTE
(netiquette, virtual self)
2. explain actions to promote ethical use of media and infor-
mation

WHAT IS NETIQUETTE?
N
CO RE C O NT E NT
etiquette refers to a collection of
rules that governs what conduct is
socially acceptable in a web or
digital scenario. It’s a social code
©NATHAN LEMON

of network communication. Netiquette is a set of rules


for behaving properly on-line. It represents the
importance of correct manners and behavior on-line. In
general, netiquette is that the set of skilled and social
etiquettes practiced and advo- cated in transmission
over any electronic network. Common pointers embody
being courteous and precise, and avoiding cyber-
bullying.
Netiquette additionally dictates that users ought to adapt
copyright laws and avoid over victimization emoticons.
It could be a short type of network rule or net rule.The
word netiquette could be a combi- nation of ‘net’
(from internet) and ‘etiquette’. It suggests that
respecting alternative users’ views and displaying
common courtesy once posting your views to on-line
discussion teams

10 CORE RULES OF NETIQUETTE


By Prof. Elizabeth Hartney
I. REMEMBER THAT REAL PEOPLE TAKE PRIORITY. If someone is in the room with you, stop you from what you
are doing and look at them. And don't answer your cell phone unless it is to tell the person on the other end that you will
call them right back. If you are expecting an important call or email, let the person with you know upfront, and
apologize for taking the call. This is also true of public places, such as restaurants, public transit, stores, elevators, and
libraries. Avoid taking phone calls and having conversations in these shared spaces.
II. IF YOU WOULDN’T SAY IT TO SOMEONE’S FACE, DON’T SAY IT ONLINE. Name-calling, cursing, ex-
pressing deliberately offensive opinions- if you wouldn't do it to the face of anyone who might conceivably see what
you're right, don't write it. This goes for any social media site, forum, chat room, for email message mama even if you
think it can't be traced back to you. It can.
Lesson 6.2 l Continue on Page 10
10
LESSON 6.2 THE NETIQUETTE
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE

III. IF YOU WOULDN’T SHOW IT IN PUBLIC, DON’T


SHARE IT ONLINE. Naked sex pictures, drunk pictures, drug
use pictures, unedited home video - if you would have a problem
with your boss, your parents, or your kids seeing it now, or at any
point in the future, don't post it online.

IV. DON’T EXCLUDE OTHERS. If you have an in-joke to


share with one other person, or a small number of people in a
larger online group, send them a private message. Don't make
everyone else feel left out by posting an obscure comment to
your Facebook status, forum, or Instagram sto- ry.
The same goes for laughing at texted or emailed jokes when
you are in the presence of others. If you don't want to share the
joke, save it for later.

V. DON’T “FRIEND” THEN “UNFRIEND” PEOPLE. It is in-


sulting to be dropped from someone's friend list on a social media
site. So, think about it before sending a friend re- quest or
accepting an invitation. If you don't want to be in touch with
someone, don't add them in the first place.
If you want to stay in touch with a colleague for profession- al
reasons, tell them you only use Facebook for close per- sonal
friendships. Then join LinkedIn or another professional networking
site for more distant contacts.

VI. DON’T OVERLOAD SYSTEM RESOURCES WITH


ENOR- MOUS FILES. You might think that sequence of nature
pic- tures with inspirational statements is wonderfully moving. It
might even give you a sense of serenity. But that is the last thing
it will give the person you email it to if it crashes their server,
depletes their inbox quota so their emails get bounced for a
week before they realize, or uses up the last bit of space they
needed to complete an important assign- ment. So post it to your
own space and send people a link. Don't attach it to an email.

VII. RESPECT PEOPLE'S PRIVACY. Don't forward infor-


mation sent to you without checking with the original sender first.
Use BCC (blind carbon copy) rather than CC (carbon copy) if
you are sending something out to more than one person. You
might think that we are all friends online, but your friends
may not want their names and or email ad- dresses publicized
to people they do not even know.

VIII. FACT-CHECK BEFORE REPOSTING. That cure for can-


cer might sound pretty impressive, but it will just cause upset if it
is a hoax. And urban myths add to the noise of the in- ternet
and waste people's time. If you aren't sure of the facts, email it
to someone who does know or can find out. Or do a search on
Google or snopes.com.

IX. CHECK AND REPOND TO EMAILS PROMPTLY. By all


means, ignore and delete spam, unsolicited messages, and crazy
stuff. But if you have given someone your email address or if
you are in a position where people could reasonably be ex-
pected to contact you by email and your email address is public,
©TIM MOSSHOLDER

have the courtesy to reply to their message within a few days. If


it is going to take longer to reply, email them and tell them
that.

X. UPDATE ONLINE INFORMATION. Don't leave inaccu-


rate information online just because you can't be bothered to
update your website. If you are going to be unavailable, for
example, don't leave your hours of operation online
indicating you will be available. If you can't keep your
website up to date, take it down
Lesson 6.2 l Continue on Page 11
11 LESSON 6.2 THE NETIQUETTE
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE

REVIEW YOURSELF!
Netiquette
 Copyrightrefers to adevice
is a legal collection of rules
that provides thethat governs
creator what artistic,
of a literary, conductmusical,
is socially
or ac- ceptable in a
There are a total of TEN (10) Core Rules of Netiquette according
different inventive work the only real right to publish and sell that job. to Professor E. Hartney:
REMEMBER THAT REAL PEOPLE TAKE PRIORITY.
IF Plagiarism
YOU WOULDN’Tis an act or instance
SAY ITofTO victimization
SOMEONE’S or closely
FACE,imitating the language
DON’T SAY IT andONLINE
thoughts of another author while not authorization;
IF YOU WOULDN’T SHOW IT IN PUBLIC, DON’T SHARE IT ONLINE. the illustration of that author’s work as
DON’T
one’s EXCLUDE
own, as by not OTHERS
crediting the first author.
DON’T “FRIEND” THEN “UNFRIEND” PEOPLE
 Cyberbullying is a type of bullying that takes place on-line, or victimization
DON’T OVERLOAD SYSTEM RESOURCES WITH ENORMOUS FILES
electronic PEOPLE'S
RESPECT technology like cell phones, computers, and tablets over communi- cation
PRIVACY
tools together with
FACT-CHECK BEFORE REPOSTINGsocial media sites, text messages, chat, and web- sites.
UPDATE ONLINE INFORMATION
 Laptop Addiction is the excessive use of computers to the extent that it interferes with
 UPDATE ONLINE INFORMATION
standard of living, particularly in using technological device.
 Digital divide is an economic difference between teams in terms of access to, use of, or data
of ICT. 1. The worldwide digital divide designates countries because the units of
study and examines the divide between developing and devel- oped countries on
a global scale.

ASSESSMENT 6.2.1 Fill in the blanks. Identify the Basic Rules of Netiquette or Internet
Etiquette.
1. No one believes you have 1,000 friends, but it is still insult- ing
to be dropped from someone’s friend list.
2. If you have an in-joke to share with one other person, or a small
number of people in a larger online group, send them a private message.
3. Naked sex pictures, drunk pictures, drug use pictures, un-
edited home video
4. By all means, ignore and delete spam, unsolicited messag- es,
and crazy stuff
5. That cure for cancer might sound pretty impressive, but it will
just cause upset if it is a hoax.
6. Name-calling, cursing, expressing deliberately offensive
opinions—if you wouldn’t do it to the face of anyone who might conceivably see what you
write, don’t write it.
7. If someone is in the room with you, stop what you are do- ing
and look at them.
8. Don’t leave inaccurate information online just because you can’t
be bothered to update your website.
9. Don’t forward information sent to you without checking with
the original sender first.
10. You might think that sequence of nature pictures with in-
spirational statements is wonderfully moving.

R
Elizabeth Hartney, 10 Basic Rules of Netiquette or Internet Etiquette: Know Your
Manners When Using Technology, VeryWellMind, January 13, 2020, https://
www. verywellmind.com/ten-rules-of-netiquette-22285
A C A DEM I C I N T E G R I T Y

noun l ac·a·dem·ic in·teg·ri·ty| \ ˌa-


kə-ˈde-mik in-ˈte-grə-tē \
1. Students are expected to be honest in preparing and
submitting their outputs. They must cite sources or references
for any materials included in their output. They are also
expected to report accurate data or results in
experiments, surveys, reports and other ac- ademic
activities.
2. The University shall strictly implement guidelines con-
cerning academic integrity stipulated in the Student
Handbook.
3. Any form of academic dishonesty, including, but not
limited to, plagiarism and cheating, will be properly
addressed through various academic dishonesty pre-
vention system that is available in the University, in-
cluding, but not limited to, student disciplinary guide-
lines.
4. Teachers, aided by approved tools such as anti-
plagiarism software (e.g. Turnitin) or websites (e.g.
www.grammarly.com), shall impose corrective
measures to students who will submit outputs, which are,
in full or in part, plagiarized or taken from an- other
students’ work. Such measures shall be included in the class
orientation kit and must consistently be mentioned in
instructions for required submissions. The following may
serve as guide:
 20% and below – acceptable
 21 to 40% - with deductions
 41 to 100% - zero grade for the output.
The student/s will be reported to the
Student Formation Officer for disciplinary
action.

LPUCAVITE
The use, disclosure, reproduction, modification and/or transfer of this
document for any purpose, in any form or by any means without approval from
Lyceum of the Philippines University Cavite is STRICTLY PROHIBITED, and may
be subject
to disciplinary and/or legal sanctions.
13 LESSON 6.3 DIGITAL DIVIDE, ADDICTION, & BULLYIN
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE

Can you still remember the 10 Core Rules of Netiquette by Professor Elizabeth Hartney. Now that you have finished studying
them, we will now proceed to our lesson about Digital Divide, Addiction and Bullying. This lesson is equivalent to 2 class meet-
ings.

L E A R N I N G O BJ E CT I V E S
KEY T E
RMS
At the end of the lesson, the learners must be able to: Digital Divide
1. put into action their personal resolve to combat digital Addiction
divide, addiction, and bullying
Bullying

CO RE C O NT E NT

RELATE?
1. DIGITAL DIVIDE. Digital divide could
be a term that refers to the gap between
demographics and regions that have ac- cess
to trendy information and technolo- gy, and
people that do not or have re- stricted
access. Before the late twentieth century,
digital divide referred principal- ly to the
division between those with and without
phone access. The digital divide generally
exists between those in cities and people in
rural areas; between the educated and the
uneducated; between socioeconomic groups;
and, globally, be- tween the more and less
industrially de- veloped nations. Even among
populations with some access to technology,
the digi- tal divide can be evident in the
form of lower-performance computers,
lower- speed wireless connections, lower-
priced connections such as dial-up, and
limited access to subscription-based content
(Rouse, 2014)
2. COMPUTER ADDICTION . A disorder
in which the individual turns to the Internet or
plays computer games to change moods,
overcome anxiety, deal with de- pression,
reduce isolation or loneliness, or distract
themselves from overwhelming problems. ©ASHKAN FOROUZANI
The elderly, as well as children
and adolescents, are particularly vulnerable because they may not realize the extent of their dependency. In many instances,
individuals with computer addiction may seek help for another condition, such as depression, phobias or oth- er addictions
(Shiel, 2018).
3. BULLYING. Stopbullying.org (2019) defines bullying as unwanted, aggressive behavior among school aged children that
involves a real or perceived power imbalance. The behavior is repeated, or has the potential to be repeated, over time. Both
kids who are bullied and who bully others may have serious, lasting problems. In order to be consid- ered bullying, the
behavior must be aggressive and include:
 An Imbalance of Power: Kids who bully use their power—such as physical strength, access to embarrassing
information, or popularity—to control or harm others. Power imbalances can change over time and in different
situations, even if they involve the same people.
 Repetition: Bullying behaviors happen more than once or have the potential to happen more than once.
Lesson 6.2 l Continue on Page 14
14 LESSON 6.3 DIGITAL DIVIDE, ADDICTION, & BULLYING
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE

B ullying includes actions such as making threats,


spreading rumors, attacking someone physical- ly or
verbally, and excluding someone from a
group on purpose. There are three types of bullying:
1. . V E R BAL B U L L Y I N G
Verbal bullying is saying or writing mean things. Ver- bal
bullying includes:
 Teasing

 Name-calling

 Inappropriate sexual comments


 Taunting

 Threatening to cause harm

2. . S O CIA L B U L L Y I N G
Social bullying, sometimes referred to as relational
bullying, involves hurting someone’s reputation or rela-
tionships. Social bullying includes:
 Leaving someone out on purpose
 Telling
other children not to be friends with
someone
 Spreading rumors about someone
 Embarrassing someone in public
3. P H Y S I C A L B U L L Y I NG
Physical bullying involves hurting a person’s body or
possessions. Physical bullying includes:
 Hitting/kicking/pinching

 Spitting o Tripping/pushing
 Taking or breaking someone’s things
 Making mean or rude hand gesture

WHATS MORE?
CYBERBULLYING, according to stopbullying.com
(2019), is bullying that takes place over digital devic- es
like cell phones, computers, and tablets. Cyberbul- lying can
occur through SMS, Text, and apps, or online in social
media, forums, or gaming where people can view,
participate in, or share content. Cyberbullying includes
sending, posting, or sharing negative, harmful, false, or mean
content about someone else. It can in- clude sharing
personal or private information about someone else
causing embarrassment or humiliation. Some cyberbullying
crosses the line into unlawful or criminal behavior.
©PIERRICK VAN-TROOST

The most common places where cyberbullying occurs are:


 Social Media, such as Facebook, Instagram, Snap- chat,
and Twitter
 SMS (Short Message Service) also known as Text
Message sent through devices
 Instant Message (via devices, email provider ser-
vices, apps, and social media messaging features)
 Email
Lesson 6.2 l Continue on Page 14
15 LESSON 6.3 DIGITAL DIVIDE, ADDICTION, & BULLYIN
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE

REVIEW YOURSELF!
Digital Divide
 Copyright is agenerally
legal deviceexists
thatbetween
provides those in cities
the creator of a and people
literary, in rural
artistic, areas;
musical, or be- tween the educ
Computer Addiction is disorder in which the individual turns
different inventive work the only real right to publish and sell that job. to the Internet or plays computer g
Bullying is defined as the unwanted, aggressive behavior among school aged chil- dren that involv
 Plagiarism
Bullying is an act
generally or instance
classified of three
into victimization or closelySocial
types: Verbal, imitating
andthe language and
Physical
Meanwhile, Cyber Bullying can occur through SMS, Text, and apps,author’s
thoughts of another author while not authorization; the illustration of that work
or online as cial media, f
in so-
one’s own, as by not crediting the first author.
 Cyberbullying is a type of bullying that takes place on-line, or victimization
electronic technology like cell phones, computers, and tablets over communi- cation
tools together with social media sites, text messages, chat, and web- sites.
 Laptop Addiction is the excessive use of computers to the extent that it interferes with
standard of living, particularly in using technological device.
 Digital divide is an economic difference between teams in terms of access to, use of, or data
of ICT. 1. The worldwide digital divide designates countries because the units of
study and examines the divide between developing and devel- oped countries on
a global scale.

ASSESSMENT 6.3.1 Evaluate yourself by answering these self-assessment questions.

1. Give one suggestion to avoid cyber bullying, and one suggestion as well to avoid
being a cyber bully.

R
Vibar, I. (2012, August 23). Carabuena: From bully to cyberbullying victim. Re-
trieved from http://news.abs-cbn.com/lifestyle/08/23/12/carabuenabully-
cyberbullying-victim
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE

WORK 3
WRITTEN
MAJOR
SEE NEXT P AGE
Name of the Student:
SECTION : MAJOR
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE

WRITTEN WORK 3
Date of Taking:
Page 1

GENERAL INSTRUCTIONS:
 Read and follow the given directions.

 FOR WIRED TAKERS: THIS ACTIVITY SHOULD BE ACCOMPLISHED IN


MYLPU

 Write your answers legibly. Erasures are NOT allowed for

 Please practice ACADEMIC INTEGRITY. An honest zero is better than a stolen hundred.

GUIDELINES:

1. Read the news article about Robert Blair Carabuena and the Metropolitan Manila Development
Authority Aide Fabros: “Carabuena: From bully to cyberbullying victim” (https://news.abs-cbn.com/
lifestyle/08/23/12/carabuena-bully-cyberbullying-victim)

TIP: You may opt to watch the news report at https:// www.youtube.com/watch?v=uLr-laylF4s

2. After reading, answer the following questions:

 What did Carabuena do that made netizens angry?

 Describe the acts of cyber bullying that the netizens did to Carabuena. Do you think their actions are
justifiable? Defend your answer.

 How did the incident affect Carabuena’s life?

 Do you think technology and the Internet has made bullying easier?

 Give one suggestion to avoid cyber bullying. Give one suggestion to avoid being a cyber bully.

3. You may write a draft for your answers before pasting them in the allotted platform located in
the MyLPU Course Site.

4. Observe proper grammar and spelling.

5. Plagiarism is STRICTLY PROHIBITED.

6. Format: PAPER SIZE – A4, STYLE – ARIAL, FONT SIZE – 12, SPACING – 1.5, MARGIN –
JUSTIFY

7. A rubric for this activity will be uploaded in myLPU.


LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE

TASK 3
MANCE
PERFOR-
MAJOR
SEE NEXT P AGE
NAME OF THE ACTIVITY: INFOGRAPHIC
Name of the Student: MAJOR
PERFORMANCE
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE

Grade and Section: TASK 3


Page 1

Guidelines:
1. Select one topic from the following items listed below.
 Ways/Tips on How To Avoid Plagiarism
 Core Rules of Netiquette
 Ways/Tips on How to Prevent Cyberbullying in Social Media?
2. Make an infographic using this link: https://create.piktochart.com/dashboard or any
traditional art material you may want to use in accomplishing this task.
3. Use your preferred media in gathering information (books, newspapers, online, etc.)
4. Do not forget to credit your source.
5. Save your work as .jpeg/.jpg or .png file ONLY.
6. Observe proper grammar and spelling.
7. Plagiarism is STRICTLY PROHIBITED.
8. Submit your work via MyLPU or via alternative platforms recommended by your teacher.
9. Your output will be graded based on the following criteria.

ADVANCED PROFICIENT PROGRESSING BASIC


(5 pts.) (4 pts.) (3 pts.) (2 pts.)
Infographic The infographic includes all The infographic includes The infographic is missing The infographic is miss-
Content the required infor- mation the required information some of the required ing several pieces of the
as outlined on the as outlined on the as- information as outlined on required information as
assignment sheet in an signment sheet. the assignment sheet. outlined on the assign-
exceptional manner. ment sheet.
Design The infographic incorpo- The infographic The infographic some- The infographic does
rates principles of design incorporates principles of what not incorporate princi-
such as alignment, bal- design such as alignment, incorporates principles of ples of design such as
ance, consistency, con- balance, consistency, design such as alignment, alignment, balance,
trast, directional flow, contrast, directional balance, consistency, consistency, contrast,
focus, flow, focus, contrast, directional flow, directional flow,

proportion, proportion, focus, proportion, white focus, proportion, white


white space, white space, space, document layers, space, document layers,
document document text effects, and color. text effects, and color.
layers, text effects, and layers, text effects, and
color in an exceptional color.
manner.

Graphics Graphic elements sup- Graphic elements sup- Graphic elements some- Graphic elements do not
port and enhance the port and enhance the what support and en- support and enhance the
message in an excep- message. hance the message. message.
tional manner.
Work Quality Quality of infographic The work was done with Final product shows little Final product does not
exceeds expectations. satisfactory effort. Cri- effort, quality is not what show
Contains no keying or teria was met. Contains 1- the learner is capable of. It effort, quality is not
grammar errors. The 2 keying or grammar is evident that the work was acceptable. It is evident
infographic is clear, and errors. The infographic is rushed. Work is in- that the work was
concise. clear and concise. complete. Contains 2-3 rushed. Work is sloppy
keying or grammar er- and incomplete. Con-
rors. The infographic is tains more than 4 key- ing
somewhat clear or con- or grammar errors. The
cise. infographic is not very
clear or concise.
A C A DEM I C I N T E G R I T Y

noun l ac·a·dem·ic in·teg·ri·ty| \ ˌa-


kə-ˈde-mik in-ˈte-grə-tē \
1. Students are expected to be honest in preparing and
submitting their outputs. They must cite sources or references
for any materials included in their output. They are also
expected to report accurate data or results in
experiments, surveys, reports and other ac- ademic
activities.
2. The University shall strictly implement guidelines con-
cerning academic integrity stipulated in the Student
Handbook.
3. Any form of academic dishonesty, including, but not
limited to, plagiarism and cheating, will be properly
addressed through various academic dishonesty pre-
vention system that is available in the University, in-
cluding, but not limited to, student disciplinary guide-
lines.
4. Teachers, aided by approved tools such as anti-
plagiarism software (e.g. Turnitin) or websites (e.g.
www.grammarly.com), shall impose corrective
measures to students who will submit outputs, which are,
in full or in part, plagiarized or taken from an- other
students’ work. Such measures shall be included in the class
orientation kit and must consistently be mentioned in
instructions for required submissions. The following may
serve as guide:
 20% and below – acceptable
 21 to 40% - with deductions
 41 to 100% - zero grade for the output.
The student/s will be reported to the
Student Formation Officer for disciplinary
action.

LPUCAVITE
The use, disclosure, reproduction, modification and/or transfer of this
document for any purpose, in any form or by any means without approval from
Lyceum of the Philippines University Cavite is STRICTLY PROHIBITED, and may
be subject
to disciplinary and/or legal sanctions.
This is the last page. Look for the Sub-
quarter D Module of this subject for
the continuation.

DO NOT LOSE NOR SELL THIS COPY.


-The Author

You might also like