MITS01C
MITS01C
MITS01C
MEDIA &
INFORMATION
LITERACY
MODULE GUIDE FOR STUDENTS
©ISAAC GARCUA
LPUCAVITE
The use, disclosure, reproduction, modification and/or transfer of this
document for any purpose, in any form or by any means without approval from
Lyceum of the Philippines University Cavite is STRICTLY PROHIBITED, and may
be subject
to disciplinary and/or legal sanctions.
©ANASTASE MARAGOS
6
LESSON
SocietalIssues in
Media and Infor-
mation
T his module covers the knowledge, skills and attitudes required to “Legal, Ethical, and Societal Issues in Media and
Information”. Define and explain copyright and other related issues, discuss the difference between copy- right infringement
between plagiarism. Discuss current issues related to copyright in relation to actions of govern-
ment and private sectors, including but not limited to Cybercrime Law RA10175, identify the different types of bully- ing.
Explain actions to promote ethical use of media and information, applying the 10 Basic Rules of Netiquette or Internet
Etiquette Know Your Manners When Using Technology
1 LESSON 6.1 COPYRIGHT, PLAGIARISM & FAIR USE
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE
RECAP: Our previous lesson class was about Media and Information Languages. Under this lesson we discussed the Media Lan-
guages, Codes, Conventions, and Messages, Audiences, Producers and Other Stakeholders. In codes or conventions, we follow
standards like traffic signs if green means go then if it is red meaning stop. So for the next lesson we will take up copyright/fair
use/plagiarism for another standard to be followed. This lesson is equivalent to ONE (1) regular class week.
L E A R N I N G O BJ E CT I V E S KEY T E RMS
At the end of the lesson, the learners must be able to: COPYRIGHT
CO RE C O NT E NT
DEFINITION
OF TERMS
1. Copyright - a legal device that
provides the creator of a literary,
©FREEPICK.COM
age the copy of their work, together with the proper to receive payment for that reproduction. Violation of
a copyright is named infringement.
2. Plagiarism - an act or instance of victimization or closely imitating the language and thoughts of
another author while not authorization; the illustration of that author’s work as one’s own, as by not
crediting the first author.
3. Cyber Bullying - bullying that takes place on-line, or victimization electronic technology like cell
phones, computers, and tablets over communication tools together with social media sites, text messages,
chat, and websites. Samples of cyber bullying: text messages or emails com- posed to insult or demean;
rumors or false statements unfold by email or denote on social net- working sites; and undignified photos,
videos, websites, or faux profiles deliberately shared across social media.
4. Laptop Addiction - the excessive use of computers to the extent that it interferes with standard of
living, particularly in using technological device. This excessive use could as an example in- terfere with
work or sleep, lead to issues with social interaction, or have an effect on mood, re- lationships, and
thought processes.
5. Digital divide - an economic difference between teams in terms of access to, use of, or data of ICT. The
divide inside countries (such because the digital divide within the United States) will check with inequalities
between people, households, businesses, and geographic areas at com- pletely different socioeconomic (and
different demographic) levels. The worldwide digital di- vide designates countries because the units of
study and examines the divide between develop- ing and developed countries on a global scale.
PLAGIARISM
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE
A
s one who consumes the day with an hour or two scrolling through different social networking sites online,
how many times have you shared contents that are not legally yours? By sharing, it could mean uploading a
new profile picture in Facebook that is taken from other people’s phone, repro-
ducing other user’s funny memes in your personal timeline, and getting quotes from Google.com and use it for your daily
Instagram stories? Were those instances warranted with the consent of the original owners or the authors? Have you
properly cited your sources whenever you answer essay questions in your assessments, or you deliberately neglect doing
so, so the answer will sound as if it came from your personal comprehension? How many times do you think you
committed plagiarism in your life?
Plagiarism defined, it is an act or instance of victimization or closely imitating the language and thoughts of
another author with no authorization; the illustration of that author’s work as one’s own, as by not crediting the first author.
In layman’s term, plagiarism is the act of taking another person’s ideas, writings,
inventions, and other similar intellectual
products as one’s own without
knowledge, consent and/or accreditation
of the original owner. It’s a grave miscon-
duct among users of information as it not only
discredits their authority as a source of
information, but plagiarism subjects them to be
©PURE JULIA
Meanwhile...
The following table enumerates the scope of the copyright or the right provided to the owner of literary and/ or artistic
works, as well as the period of the validity of such right as prescribed by RA 8293.
LITERARY WORKS During the lifetime of the author plus 50 years after death
The same law accounts the validity period of two other intellectual property rights such as the Trademark Rights
and the Patent Rights.
Students!
This photo right here was plagiarized by a graduate s tudent of the Univer
$1,000. Catch-up with the details about this case in th e next page!
READING COMPREHENSION
A. In what competition did Solis send in his plagiarized work?
B. What sanctions did he receive from the organizing committee? Describe his actions
.
C. Do you think technology and internet have made plagiarism easier? Do you think technology has made peo - ple more or
less creative? Explain your answer with examples.
ETCETER
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE
Aside from Copyright, the law also protects the Patent rights and the Trademark rights of
other intellectual properties.
1. A Patent is an exclusive right granted for an in-
2. A Trademark is a sign capable of distinguishing the
vention. Generally speaking, a patent provides the
goods or services of one enterprise from those of other
patent owner with the right to decide how - or whether
enterprises. Trademarks date back to ancient times when
- the invention can be used by others. In exchange
craftsmen used to put their signature or "mark" on their
for this right, the patent owner makes technical
products.
information about the invention publicly available in
the published patent document. For instance, the photos ™ means the owner of the mark has common law rights
below illustrates the patent application of the Coca- even though the mark has not been registered while the
Cola bottle and cap by the Coca-Cola Company and ®, on the other hand, is only used for marks that
the first model of the telephone by Alexander have been granted registration. Below are logos of
Graham Bell. commercial franchises that are protect- ed with
Trademark Rights.
Figure 1. Patent Application of Coca-Cola Bottle and Cap Figure 3. McDonalds logo with a ™ attached to it.
REVIEW YOURSELF!
Copyright is a legal device that provides the creator of a literary, artistic, musical, or different inven
Plagiarism is an act or instance of victimization or closely imitating the language and thoughts of an
Cyberbullying is a type of bullying that takes place on-line, or victimization electronic technolo
Laptop Addiction is the excessive use of computers to the extent that it interferes with standard o
Digital divide is an economic difference between teams in terms of access to, use of, or data of IC
Multiple Choice. Write your correct answer in the space provided. Choose the correct let-
ter only.
1. What sanctions did Solis receive from the organizing committee? A. Manage a foot- ball
program B. Forfeit his award C. Personal Apology D. Awarded $1000 roundtrip ticket
2. Using electronic technology such as cell phones, computers, and tablets over commu-
nication tools including social media sites, text messages, chat, and websites. A.
Copyright B. Plagiarism C. Cyber Bullying D. Computer addiction
3. An economic inequality between groups in terms of access to, use of, or knowledge
of ICT. A. Digital divide B. Plagiarism C. Cyber Bullying D. Computer addiction
4. An act or instance of using or closely imitating the language and thoughts of another
author without authorization A. Copyright B. Plagiarism C. Cyber Bullying D. Computer
addiction
5. The excessive use of computers to the extent that it interferes with daily life. This ex-
cessive use may for example interfere with work or sleep, result in problems with
social interaction, or affect mood, relationships, and thought processes. A. Copyright
B. Plagiarism C. Cyber Bullying D. Computer addiction
6. In what competition did Solis send in his plagiarized work? A. Photo of a boy B. Dur- ing
Chiles National Day C. Smiles for the World D.Neptune, King of the Sea
7. A legal device that gives the creator of a literary, artistic, musical, or other creative
work the sole right to publish and sell that work. A. Copyright B. Plagiarism C. Cyber
Bullying D. Computer addiction
gets-redemption
A C A DEM I C I N T E G R I T Y
noun l ac·a·dem·ic in·teg·ri·ty| \ ˌa-
kə-ˈde-mik in-ˈte-grə-tē \
1. Students are expected to be honest in preparing and
submitting their outputs. They must cite sources or references
for any materials included in their output. They are also
expected to report accurate data or results in
experiments, surveys, reports and other ac- ademic
activities.
2. The University shall strictly implement guidelines con-
cerning academic integrity stipulated in the Student
Handbook.
3. Any form of academic dishonesty, including, but not
limited to, plagiarism and cheating, will be properly
addressed through various academic dishonesty pre-
vention system that is available in the University, in-
cluding, but not limited to, student disciplinary guide-
lines.
4. Teachers, aided by approved tools such as anti-
plagiarism software (e.g. Turnitin) or websites (e.g.
www.grammarly.com), shall impose corrective
measures to students who will submit outputs, which are,
in full or in part, plagiarized or taken from an- other
students’ work. Such measures shall be included in the class
orientation kit and must consistently be mentioned in
instructions for required submissions. The following may
serve as guide:
20% and below – acceptable
21 to 40% - with deductions
41 to 100% - zero grade for the output.
The student/s will be reported to the
Student Formation Officer for disciplinary
action.
LPUCAVITE
The use, disclosure, reproduction, modification and/or transfer of this
document for any purpose, in any form or by any means without approval from
Lyceum of the Philippines University Cavite is STRICTLY PROHIBITED, and may
be subject
to disciplinary and/or legal sanctions.
9 LESSON 6.2 THE NETIQUETTE
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE
In our previous lesson class we discussed the Copyright, Plagiarism, Fair Use, Cyber bullying, and Computer Addiction. What is
the difference of being charge by copyright infringement and plagiarism? What are the different types of bullying? At this point
we will learn the core rules of Internet Etiquette or so is called the Netiquette. This lesson is equivalent to 2 class meetings.
L E A R N I N G O BJ E CT I V E S KEY T E RMS
At the end of the lesson, the learners must be able to: NETIQUETTE
1. demonstrates proper conduct and behavior online RULES OF NETIQUETTE
(netiquette, virtual self)
2. explain actions to promote ethical use of media and infor-
mation
WHAT IS NETIQUETTE?
N
CO RE C O NT E NT
etiquette refers to a collection of
rules that governs what conduct is
socially acceptable in a web or
digital scenario. It’s a social code
©NATHAN LEMON
REVIEW YOURSELF!
Netiquette
Copyrightrefers to adevice
is a legal collection of rules
that provides thethat governs
creator what artistic,
of a literary, conductmusical,
is socially
or ac- ceptable in a
There are a total of TEN (10) Core Rules of Netiquette according
different inventive work the only real right to publish and sell that job. to Professor E. Hartney:
REMEMBER THAT REAL PEOPLE TAKE PRIORITY.
IF Plagiarism
YOU WOULDN’Tis an act or instance
SAY ITofTO victimization
SOMEONE’S or closely
FACE,imitating the language
DON’T SAY IT andONLINE
thoughts of another author while not authorization;
IF YOU WOULDN’T SHOW IT IN PUBLIC, DON’T SHARE IT ONLINE. the illustration of that author’s work as
DON’T
one’s EXCLUDE
own, as by not OTHERS
crediting the first author.
DON’T “FRIEND” THEN “UNFRIEND” PEOPLE
Cyberbullying is a type of bullying that takes place on-line, or victimization
DON’T OVERLOAD SYSTEM RESOURCES WITH ENORMOUS FILES
electronic PEOPLE'S
RESPECT technology like cell phones, computers, and tablets over communi- cation
PRIVACY
tools together with
FACT-CHECK BEFORE REPOSTINGsocial media sites, text messages, chat, and web- sites.
UPDATE ONLINE INFORMATION
Laptop Addiction is the excessive use of computers to the extent that it interferes with
UPDATE ONLINE INFORMATION
standard of living, particularly in using technological device.
Digital divide is an economic difference between teams in terms of access to, use of, or data
of ICT. 1. The worldwide digital divide designates countries because the units of
study and examines the divide between developing and devel- oped countries on
a global scale.
ASSESSMENT 6.2.1 Fill in the blanks. Identify the Basic Rules of Netiquette or Internet
Etiquette.
1. No one believes you have 1,000 friends, but it is still insult- ing
to be dropped from someone’s friend list.
2. If you have an in-joke to share with one other person, or a small
number of people in a larger online group, send them a private message.
3. Naked sex pictures, drunk pictures, drug use pictures, un-
edited home video
4. By all means, ignore and delete spam, unsolicited messag- es,
and crazy stuff
5. That cure for cancer might sound pretty impressive, but it will
just cause upset if it is a hoax.
6. Name-calling, cursing, expressing deliberately offensive
opinions—if you wouldn’t do it to the face of anyone who might conceivably see what you
write, don’t write it.
7. If someone is in the room with you, stop what you are do- ing
and look at them.
8. Don’t leave inaccurate information online just because you can’t
be bothered to update your website.
9. Don’t forward information sent to you without checking with
the original sender first.
10. You might think that sequence of nature pictures with in-
spirational statements is wonderfully moving.
R
Elizabeth Hartney, 10 Basic Rules of Netiquette or Internet Etiquette: Know Your
Manners When Using Technology, VeryWellMind, January 13, 2020, https://
www. verywellmind.com/ten-rules-of-netiquette-22285
A C A DEM I C I N T E G R I T Y
LPUCAVITE
The use, disclosure, reproduction, modification and/or transfer of this
document for any purpose, in any form or by any means without approval from
Lyceum of the Philippines University Cavite is STRICTLY PROHIBITED, and may
be subject
to disciplinary and/or legal sanctions.
13 LESSON 6.3 DIGITAL DIVIDE, ADDICTION, & BULLYIN
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE
Can you still remember the 10 Core Rules of Netiquette by Professor Elizabeth Hartney. Now that you have finished studying
them, we will now proceed to our lesson about Digital Divide, Addiction and Bullying. This lesson is equivalent to 2 class meet-
ings.
L E A R N I N G O BJ E CT I V E S
KEY T E
RMS
At the end of the lesson, the learners must be able to: Digital Divide
1. put into action their personal resolve to combat digital Addiction
divide, addiction, and bullying
Bullying
CO RE C O NT E NT
RELATE?
1. DIGITAL DIVIDE. Digital divide could
be a term that refers to the gap between
demographics and regions that have ac- cess
to trendy information and technolo- gy, and
people that do not or have re- stricted
access. Before the late twentieth century,
digital divide referred principal- ly to the
division between those with and without
phone access. The digital divide generally
exists between those in cities and people in
rural areas; between the educated and the
uneducated; between socioeconomic groups;
and, globally, be- tween the more and less
industrially de- veloped nations. Even among
populations with some access to technology,
the digi- tal divide can be evident in the
form of lower-performance computers,
lower- speed wireless connections, lower-
priced connections such as dial-up, and
limited access to subscription-based content
(Rouse, 2014)
2. COMPUTER ADDICTION . A disorder
in which the individual turns to the Internet or
plays computer games to change moods,
overcome anxiety, deal with de- pression,
reduce isolation or loneliness, or distract
themselves from overwhelming problems. ©ASHKAN FOROUZANI
The elderly, as well as children
and adolescents, are particularly vulnerable because they may not realize the extent of their dependency. In many instances,
individuals with computer addiction may seek help for another condition, such as depression, phobias or oth- er addictions
(Shiel, 2018).
3. BULLYING. Stopbullying.org (2019) defines bullying as unwanted, aggressive behavior among school aged children that
involves a real or perceived power imbalance. The behavior is repeated, or has the potential to be repeated, over time. Both
kids who are bullied and who bully others may have serious, lasting problems. In order to be consid- ered bullying, the
behavior must be aggressive and include:
An Imbalance of Power: Kids who bully use their power—such as physical strength, access to embarrassing
information, or popularity—to control or harm others. Power imbalances can change over time and in different
situations, even if they involve the same people.
Repetition: Bullying behaviors happen more than once or have the potential to happen more than once.
Lesson 6.2 l Continue on Page 14
14 LESSON 6.3 DIGITAL DIVIDE, ADDICTION, & BULLYING
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE
Name-calling
2. . S O CIA L B U L L Y I N G
Social bullying, sometimes referred to as relational
bullying, involves hurting someone’s reputation or rela-
tionships. Social bullying includes:
Leaving someone out on purpose
Telling
other children not to be friends with
someone
Spreading rumors about someone
Embarrassing someone in public
3. P H Y S I C A L B U L L Y I NG
Physical bullying involves hurting a person’s body or
possessions. Physical bullying includes:
Hitting/kicking/pinching
Spitting o Tripping/pushing
Taking or breaking someone’s things
Making mean or rude hand gesture
WHATS MORE?
CYBERBULLYING, according to stopbullying.com
(2019), is bullying that takes place over digital devic- es
like cell phones, computers, and tablets. Cyberbul- lying can
occur through SMS, Text, and apps, or online in social
media, forums, or gaming where people can view,
participate in, or share content. Cyberbullying includes
sending, posting, or sharing negative, harmful, false, or mean
content about someone else. It can in- clude sharing
personal or private information about someone else
causing embarrassment or humiliation. Some cyberbullying
crosses the line into unlawful or criminal behavior.
©PIERRICK VAN-TROOST
REVIEW YOURSELF!
Digital Divide
Copyright is agenerally
legal deviceexists
thatbetween
provides those in cities
the creator of a and people
literary, in rural
artistic, areas;
musical, or be- tween the educ
Computer Addiction is disorder in which the individual turns
different inventive work the only real right to publish and sell that job. to the Internet or plays computer g
Bullying is defined as the unwanted, aggressive behavior among school aged chil- dren that involv
Plagiarism
Bullying is an act
generally or instance
classified of three
into victimization or closelySocial
types: Verbal, imitating
andthe language and
Physical
Meanwhile, Cyber Bullying can occur through SMS, Text, and apps,author’s
thoughts of another author while not authorization; the illustration of that work
or online as cial media, f
in so-
one’s own, as by not crediting the first author.
Cyberbullying is a type of bullying that takes place on-line, or victimization
electronic technology like cell phones, computers, and tablets over communi- cation
tools together with social media sites, text messages, chat, and web- sites.
Laptop Addiction is the excessive use of computers to the extent that it interferes with
standard of living, particularly in using technological device.
Digital divide is an economic difference between teams in terms of access to, use of, or data
of ICT. 1. The worldwide digital divide designates countries because the units of
study and examines the divide between developing and devel- oped countries on
a global scale.
1. Give one suggestion to avoid cyber bullying, and one suggestion as well to avoid
being a cyber bully.
R
Vibar, I. (2012, August 23). Carabuena: From bully to cyberbullying victim. Re-
trieved from http://news.abs-cbn.com/lifestyle/08/23/12/carabuenabully-
cyberbullying-victim
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE
WORK 3
WRITTEN
MAJOR
SEE NEXT P AGE
Name of the Student:
SECTION : MAJOR
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE
WRITTEN WORK 3
Date of Taking:
Page 1
GENERAL INSTRUCTIONS:
Read and follow the given directions.
Please practice ACADEMIC INTEGRITY. An honest zero is better than a stolen hundred.
GUIDELINES:
1. Read the news article about Robert Blair Carabuena and the Metropolitan Manila Development
Authority Aide Fabros: “Carabuena: From bully to cyberbullying victim” (https://news.abs-cbn.com/
lifestyle/08/23/12/carabuena-bully-cyberbullying-victim)
TIP: You may opt to watch the news report at https:// www.youtube.com/watch?v=uLr-laylF4s
Describe the acts of cyber bullying that the netizens did to Carabuena. Do you think their actions are
justifiable? Defend your answer.
Do you think technology and the Internet has made bullying easier?
Give one suggestion to avoid cyber bullying. Give one suggestion to avoid being a cyber bully.
3. You may write a draft for your answers before pasting them in the allotted platform located in
the MyLPU Course Site.
6. Format: PAPER SIZE – A4, STYLE – ARIAL, FONT SIZE – 12, SPACING – 1.5, MARGIN –
JUSTIFY
TASK 3
MANCE
PERFOR-
MAJOR
SEE NEXT P AGE
NAME OF THE ACTIVITY: INFOGRAPHIC
Name of the Student: MAJOR
PERFORMANCE
LYCEUM OF THE PHILIPPINES UNIVERSITY– CAVITE
Guidelines:
1. Select one topic from the following items listed below.
Ways/Tips on How To Avoid Plagiarism
Core Rules of Netiquette
Ways/Tips on How to Prevent Cyberbullying in Social Media?
2. Make an infographic using this link: https://create.piktochart.com/dashboard or any
traditional art material you may want to use in accomplishing this task.
3. Use your preferred media in gathering information (books, newspapers, online, etc.)
4. Do not forget to credit your source.
5. Save your work as .jpeg/.jpg or .png file ONLY.
6. Observe proper grammar and spelling.
7. Plagiarism is STRICTLY PROHIBITED.
8. Submit your work via MyLPU or via alternative platforms recommended by your teacher.
9. Your output will be graded based on the following criteria.
Graphics Graphic elements sup- Graphic elements sup- Graphic elements some- Graphic elements do not
port and enhance the port and enhance the what support and en- support and enhance the
message in an excep- message. hance the message. message.
tional manner.
Work Quality Quality of infographic The work was done with Final product shows little Final product does not
exceeds expectations. satisfactory effort. Cri- effort, quality is not what show
Contains no keying or teria was met. Contains 1- the learner is capable of. It effort, quality is not
grammar errors. The 2 keying or grammar is evident that the work was acceptable. It is evident
infographic is clear, and errors. The infographic is rushed. Work is in- that the work was
concise. clear and concise. complete. Contains 2-3 rushed. Work is sloppy
keying or grammar er- and incomplete. Con-
rors. The infographic is tains more than 4 key- ing
somewhat clear or con- or grammar errors. The
cise. infographic is not very
clear or concise.
A C A DEM I C I N T E G R I T Y
LPUCAVITE
The use, disclosure, reproduction, modification and/or transfer of this
document for any purpose, in any form or by any means without approval from
Lyceum of the Philippines University Cavite is STRICTLY PROHIBITED, and may
be subject
to disciplinary and/or legal sanctions.
This is the last page. Look for the Sub-
quarter D Module of this subject for
the continuation.