Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Q1 Mil Lecture Lesson6

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

MEDIA AND INFORMATION LITERACY THE SPECTRUM OF RIGHTS

QUARTER 1 LECTURE

LESSON 6: LEGAL, ETHICAL, AND SOCIETAL ISSUES IN


MEDIA AND INFORMATION LITERACY
Copyright Creative Public Domain
All rights Commons No rights
reserved Some rights reserved
Digital Citizenship - A person who acquires the - Requires the reserved - May be used
knowledge and abilities necessary to use the internet permission of - Re-use is free or without
and other digital technologies efficiently is referred to the copyright permitted without permission
as a digital citizen. They also make responsible and owner to re-use permission under
proper use of modern technologies and the internet. the specific shared
in the license
Intellectual Property - refers to creations of the mind,
such as inventions; literacy and artistic works; designs; 3. Patent - is an exclusive right granted for an invention,
and symbols, names and images used in commerce. which is a product or a process that provides, in general,
a new way of doing something, or offers a new technical
TYPES OF INTELLECTUAL PROPERTY solution to a problem. To get a patent, technical
1. Copyright - a legal device that gives the creator of a information about the invention must be disclosed to
literary, artistic, musical, or other creative work the sole the public in a patent application.
right to publish and sell that work. Copyright owners
have the right to control the reproduction of their work, 4. Trademarks - The term trademark refers to an
including the right to receive payment for that identifiable insignia, phrase, word, or symbol that
reproduction. An author may grant or sell those rights designates a certain product and legally distinguishes it
to others, including publishers or recording companies. from all other products of its sort. A trademark
Violation of a copyright is called infringement. identifies a product as belonging to a specific firm and
acknowledges the company's ownership of the brand.
2. Plagiarism - an act or instance of using or closely
imitating the language and thoughts of another author 5. Industrial Design - Protects only the appearance
without authorization; the representation of that features of a product such as shape, surface, patterns,
author's work as one's own, as by not crediting the lines, or color
original author.
Examples of Plagiarism: 6. Geographical Indications and Appellations of Origin -
 Copying media(images) from other Signs used on products possessing qualities, a status, or
websites to paste them into your own characteristics that are essentially attributable to that
papers or websites location of origin.
 Performing another person's
copyrighted music COMMON ISSUES IN DATA PRIVACY
 Taking someone's words or ideas as if 1. Hacking - The act of compromising digital devices and
they were your own networks through unauthorized access to an account or
 Making a video using footage from computer system. Hacking is not always a malicious act,
others' videos or using copyrighted but it is most commonly associated with illegal activity
music as part of the soundtrack and data theft by cyber criminals.

Fair use is the right to use a copyrighted 2. Phishing - involves the mass sending of emails from
work under certain conditions without permission seemingly real addresses with the goal of tricking
of the copyright owner such as commentary, search potential victims into opening the links or attachments
engines, criticism, parody, news reporting, research, included in them.
teaching, and scholarship.
3. Identity theft - when someone uses your personal individuals, households, businesses, and geographic
information such as: your name, social security number, areas at different socioeconomic (and other
credit card number or other identifying information, demographic) levels. The Global digital divide
without permission to commit fraud or other crimes. designates countries as the units of analysis, and
examines the divide between developing and developed
Cybercrime - are any crimes that involves a computer countries on an international scale.
and a network in some cases the computer may have
been use in order to commit the crime and in other Netiquette - is a made-up word from the words net and
cases the computer may have been the target of the etiquette. Netiquette thus describes the rules of
crime. conduct for respectful and appropriate communication
on the internet.
Cyber Bullying - bullying that takes place online,
or using electronic technology such as cell
phones, computers, and tablets over
communication tools including social media
sites, text messages, chat, and websites.
Examples of cyber bullying: text messages or
emails composed to insult or demean; rumors
or false statements spread by email or posted
on social networking sites; and humiliating
photos, videos, websites, or fake profiles
deliberately shared across social media.

Computer addiction - the excessive use of computers to


the extent that it interferes with daily life. This excessive
use may for example interfere with work or sleep, result
in problems with social interaction, or affect mood,
relationships, and thought processes.

TRIGGERS OF COMPUTER ADDICTION


a. Computer games
b. Online shopping
c. Social Media
d. Computer Streaming
e. Online Gambling

EFFECTS OF COMPUTER ADDICTION


a. leads to problem like weak eyesight and
mental problem
b. makes a person not interested in other
events
c. Back and neck aches
d. Sleep deprivation
e. Anxiety and depression

Digital Divide - an economic inequality between groups


in terms of access to, use of, or knowledge of ICT. The
divide within countries (such as the digital divide in the
United States) can refer to inequalities between

You might also like