Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Lesson 7

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 23

LEGAL, AND ETHICAL

ISSUES IN MEDIA
AND INFORMATION
What is Digital Citizen-
ship?
Ability to find, access, use, and create informa-
tion effectively; engage with other users and with
content in an active, critical, sensitive and ethi-
cal manner; and navigate the online and ICT envi-
ronment safely and responsibly, being aware of
one’s own rights (UNESCO, 2016)
Intellectual Property
Refers to the “creations of the mind such as inventions, lit-
erary and artistic works, designs, symbols, names, and
images used in commerce”

TYPES OF INTELLECTUAL PROPERTY


1. Copyright. A legal term used to describe the rights that
creators have over their literary and artistic works and
gives the creator the sole right to publish and sell that work.
- Protects the form of material expression and is only avail-
able for works that are fixed in tangible form.
PLAGIARISM
An act or instance of using or closely imitating the language and
thoughts of another author without authorization; the represen-
tation of that author’s work as one’s own, as by not crediting the
original author.
Examples:
- Copying media (especially images) from other websites to
paste them into your own papers or websites.
- Making a video using footage from others’ videos or using
copyrighted music as part of the soundtrack
- Performing another person’s copyrighted music (i.e., playing
a cover)
- Composing a piece of music that borrows heavily from
another composition
What is Fair Use?
A legal principle stating that one can use a copyrighted work with-
out a license for the following purposes: commentary, criticism, re-
porting, research, and teaching.
Commentary
Criticism
Reporting
Research
Teaching
GUIDELINES FOR FAIR USE
• A majority of the content you create
must be your own.
• Give credit to the copyright holder.
• Don’t make money off of the
copyright work.
Patent. Exclusive right granted for an invention, which is a product or a process
that provides, in general, a new way of doing something, or offers a new tech-
nical solution to a problem.

Provides the right to consent on the invention or a way for others to use it.
Technical information about the invention must be disclosed to the public
2. TRADEMARK
Distinguished sign of goods or services that identifies and
differentiates from one enterprise to another; a signa-
ture mark.
 
3. INDUSTRIAL DE-
SIGN
Protects only the appearance or aesthetic features of a
product such as shape, surface, patterns, lines, or color.
4. GEOGRAPHICAL INDICATIONS
AND APPELATIONS OF ORIGIN
Signs used on products possessing qualities, a status, or
characteristics that are essentially attributable to that location of
origin.
COMMON ISSUES ON DATA PRIVACY
Hacking. Involves activities that seek to compromise digital de-
vice, such as computers, smartphones, tablets, and even entire
networks.
-An attempt to exploit a computer system or a private network in-
side a computer.
-Unauthorized access to or control over computer network security
systems for some illicit purpose.
Phishing. A type of social engineering attack often used to steal
user data, including login credentials and credits card numbers.
-Unlike other kinds of online threats, phishing does not require
particularly sophisticated technical expertise.
COMMON ISSUES ON DATA PRIVACY

Phishing. A type of social engineering attack often used to steal


user data, including login credentials and credits card numbers.
-Unlike other kinds of online threats, phishing does not require
particularly sophisticated technical expertise.
COMMON ISSUES ON DATA PRIVACY

Identity Theft. Occurs when a criminal obtains or uses the per-


sonal information of someone else to assume their identity or ac-
cess their accounts for the purpose of committing fraud, receiving
benefits, or gaining financially in some way.
COMMON ISSUES ON DATA PRIVACY
What is Cybercrime?
Also called computer crime; any criminal
activity that involves the use of a computer,
networked device, or a network as an
instrument to further illegal ends.
  ther forms of Cybercrime
O
Piracy and Illegal Downloads
Cybersquatting
Online Drug Trafficking
Cyber Libel or Cyber Defamation
Online Harassment (Cyberstalking, Internet Trolls, etc)
Internet Pornography
Online Predators and other Sex Crimes
 
What is Cyberbullying?
The use of digital means of communication that could hurt or
harass a person such as intentionally sending hurtful texts or
SNS messages, posting embarrassing photos or videos, and
spreading malicious rumors online.

What is Fake Information?


News, stories, or hoaxes created to deliberately misinform or deceive
readers and created to either influence people’s views, push a
political agenda, or cause confusion and can often be a profitable
business for online publishers.
COMPUTER ADDIC-
TION
An overdependence or a damaging need to do something on
computer or internet; excessive use of computers to the extent
that it interferes with daily life.
Triggers for Computer
Addiction Effects of Computer Addiction
 Computer Games  Sleep deprivation
 Online shopping  Anxiety
 Social media  Depression
 Video streaming  Relationship Problems
 Online gambling
DIGITAL GAP
The digital inequality or gap between groups in terms of
knowledge, usage, and access to ICT due to circumstances like
location, income, and age.

NETIQUETTE
Defined as a set of rules for proper and acceptable online behav-
ior; denotes the proper attitude that one should have and ob-
served when communicating online.
CORE RULES OF NETIQUETTE (SHEA, 1994)
1. Remember the Human
2. Adhere to the same standards of behavior online
that you follow in real life
3. Know where you are in cyberspace
4. Respect other people’s time and bandwidth
5. Make yourself look good online
6. Share expert knowledge
7. Help keep flame wars under control

You might also like