0% found this document useful (0 votes)
42 views13 pages

SDLP Topic 2

ISSUES

Uploaded by

Crystal Mae Agan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views13 pages

SDLP Topic 2

ISSUES

Uploaded by

Crystal Mae Agan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

SEMI-DETAILED LESSON PLAN IN ICT (GRADE 12)

Prepared by: Crystal Mae A. Agan

I. Objectives: At the end 1 hour and 30-minutes discussion, the students are expected to;
a. Identify the legal, ethical and societal issues in media and information;
b. Demonstrate proper conduct and behavior online (netiquette, virtual self);
c. Follow actions to promote ethical use of media and information.

II. Subject Matter/ Content


A. Topic: Legal, Ethical, and Societal issues in Media and information
B. References:
 Elizabeth Hartney, 10 Basic Rules of Netiquette or Internet Etiquette:
https://www.verywellmind.com/ten-rules-of-netiquette-2228
 Grade 12 Media and Information Literacy Teacher’s Guide, pages 52-56
C. Materials:

 Power Point Presentation

III. Procedures

Teacher’s Activity Student’s Activity

A. PRELIMINARY ACTIVITIES
1. Greetings

“Good Morning Class”


“Good Morning Ma’am”

2. Prayer

“Let us pray first.”


(One student will lead the Prayer)
“Dear Lord, Thank you for today. Thank you for
the love, grace, and life you have given to us all.
Make our hearts and minds focus on what we are
about to learn. Amen.”
3. Checking of Attendance

“Say present if your name is called.”


“Please pick up some pieces of paper under your
chair.”
(Student will pick up the pieces of paper)
“So how was your weekend?”
“Have you enjoyed your weekend bonding with
your family?”
“It was great ma’am! It was a lot of fun!”

“That’s good to know.”

4. Review of the Past Lesson

“Let’s have a short review on the past lesson that


we have for Evolution of Traditional Media to
New Media.”

“Define Traditional and New Media.”

(One student answered)

“Your answer is correct. Thank You.”

“Is there any question about our past lesson? If


none, then let us proceed!”

5. Motivation

The teacher will post a picture through power


point presentation and let the students observe the
pictures.
“What have you notice in this picture?”
“What does it say’s, or what does the picture
portrays?”

B. LESSON PROPER
(Discussion)

(some answers yes and some answers no)

“The picture shows the faces of Monalisa with


different angles, position and clothes she wore but
when you try to look deeper it has something to
do with our media.”

“Are you familiar with the words Cybercrime and


cyberbullying?”

“to make everything clear, lets proceed”

Cybercrime is a crime that involves a computer


and a network. The computer may have been used
in the commission of a crime, or it may be the
target. Cybercrime may harm someone's security
and financial health.
-the use of a computer as an instrument to further
illegal ends, such as committing fraud, trafficking
in child pornography and intellectual property,
stealing identities, or violating privacy.

Did you know that In June 2021, there were


98.41 thousand cyberattacks reported in the
Philippines, reflecting a significant decline from
the same month of the previous year. The number
of cyberattacks in the country were exponential
during the first quarter of the year, reaching as
much as around 1.76 million.

TOP LIST OF CYBERCRIMES!


1. Phishing – Phishing refers to emailing or
contacting someone by pretending to
belong to a well-known and famous
organization. Cybercriminals use phishing
to lure people into providing sensitive
information like credit card details and
addresses.

For example: “Tap on this link and win a


million dollars right away!” Sounds too good to
be true, right?” Also in text messages.

2. Cyber Extortion - Cyber extortion is a


crime where someone holds your data
hostage till your company pays the
ransom. Cybercriminals gain access to
your computers and steal confidential
data. They often gain this access by
sending suspicious emails containing
malware—malicious software—that
hijacks your computer. They can resort to
blackmail, denial of service, locking you
out of your system, and more.

3. Identify theft - Identity theft happens


when a person pretends to be someone
else to commit fraud. Cybercriminals
steal your personal information, like
identity cards, credit cards and the like, to
make transactions. The most common
type of identity theft is financial identity
theft.

- Using of other identity pretending he


is the owner.

4. Harassment - Harassment includes


bullying, stalking and the like. Sometimes
insiders use confidential information to
bully the business owner. Other times,
outside cybercriminals use the
information to threaten individuals. They
don’t always use only business data.
Many use personal information, like
pictures, family details, and more, to
harass your business or employees. They
know that the leakage of that information
will be detrimental to your business.

10175 -
“Cybercrime Prevention Act of 2012”
which addresses crimes committed
against and through computer systems on
12 September 2012.

- Any person found guilty of any of the


punishable acts enumerated in Section 4(c)(1) of
this Act shall be punished with imprisonment or a
fine of at least Two hundred thousand pesos
(PhP200,000.00) but not exceeding One million
pesos (PhPl,000,000.00) or both.

Legal, Ethical and Societal Issues in Media and


Information!

People must know and understand their rights and


responsibilities as media and information
providers and consumers in order to become
digital citizens.
REPUBLIC ACT NO. 10175
Cybercrime Prevention Act of 2012
-Is a law in the Philippines approved on
September 12, 2012, which aims to address legal
issues concerning online interactions and the
Internet.
- Among the cybercrime offenses included in
the bill are cybersquatting, cybersex, child
pornography, identity theft, illegal access to data
and libel.

The teacher shows examples and media applications that


will help the learners understand more about copyright and
plagiarism.

The teacher shows examples and media applications that


will help the learners understand more about cyberbullying
and computer addiction.
“Which ones do you understand? Which ones do
you not know?”
A. COPY RIGHT - A legal device that
gives the creator of a literary, artistic,
musical, or other creative work the sole
right to publish and sell that work.
Copyright owners have the right to
control the reproduction of their work,
including the right to receive payment for
that reproduction. An author may grant or
sell those rights to others, including
publishers or recording companies.
Violation of a copyright is called
infringement.
B. PLAGIARISM
the practice of taking someone else's work
or ideas and passing them off as one's
own.
Is a law in the Philippines approved on
September 12, 2012, which aims to
address legal issues concerning online
interactions and the Internet.
Among the cybercrime offenses included
in the bill are cybersquatting, cybersex,
child pornography, identity theft, illegal
access to data and libel.
CYBERBULLYING –Cyberbullying includes
sending, posting, or sharing negative, harmful,
false, or mean content about someone else. It can
include sharing personal or private information
about someone else causing embarrassment or
humiliation.
Is a law in the Philippines approved on
September 12, 2012, which aims to
address legal issues concerning online
interactions and the Internet. Among the
cybercrime offenses included in the bill
are cybersquatting, cybersex, child
pornography, identity theft, illegal access
to data and libel.
C. COMPUTER ADDICTION
a form of behavioral addiction that can be
described as the excessive or compulsive
use of the computer, which persists
despite serious negative consequences for
personal, social, or occupational function.

Is a law in the Philippines approved on


September 12, 2012, which aims to
address legal issues concerning online
interactions and the Internet.Among the
cybercrime offenses included in the bill
are cybersquatting, cybersex, child
pornography, identity theft, illegal access
to data and libel.
D. NETIQUETTE
- The correct or acceptable way of
communicating on the internet.
- or network etiquette is a set of rules
for behaving properly online. It is the
correct or acceptable way of
communicating on the internet.

E. CYBER SEX
- Also called computer sex, internet
sex, netsex.
- Is a virtual sex encounter in which
two or more people (connected
remotely via internet) send each other
sexually explicit contents or sexually
explicit acts.

Addition:

POSSIBLE DANGER USING THE INTERNET

The internet feels like a safe place to be. You are


in your home or another familiar environment,
and physically there is nothing the internet can do
to harm you. The issue is that our data has become
so ingrained into our identities that being hacked
can lead to disastrous results:

1. Sexual Predators – The online world


opens the door for trusting young people
to interact with virtual strangers. Sexual
predators have targeted children in chat
rooms, they migrate to wherever young
people go online. Predators may take on
fake identities.

Here some safety tips:


- Ask your children if they use a social
networking site. Look at the site together
or search for it yourself online. Social
networking sites often have age limits.
- Tell your kids not to post a full name,
address, phone number, school name and
other personal information that could help
a stranger to find them.
- Learn about privacy settings that allow
kids to choose who can view their
profiles. Explain that strangers who
approach them online aren't always who
they say they are - and that it's dangerous
to meet them in real life. Tell them to
"instant message" only with family or
friends they already know off-line.

2. Pornography – One of the worst dangers


of the internet. Parents may not realize
that some kids are going online to seek
out web porn.

Tips:
- Install Internet filtering software to block
porn sites from any computer your child
has access to.

3. Damaged Reputations - Camera phones,


digital cameras and web cams are
everywhere these days, and kids can be
victims of their own inexperience with
new technology. Many post pictures,
videos or notes online that they later
regret. "Think before you post, because
once you do, it's going to be up there
forever," Shehan says.
Tips:
- Explain that even if your kids delete their
posted photos, others may have already (a student answer)
copied them into public forums and
websites.
- Tell your kids not to let anyone, even
friends, take pictures or videos of them
that could cause embarrassment online -
such as if a relative or teacher saw them.
(Mr. _____ stating his answer)
How You Can Protect Yourself
1.Use unique, complicated passwords for
important accounts
2. Delete old accounts
3. Monitor for phishing scams and malware
4. Back up important information offline
5.Keep all software up to date
6.Install anti-virus software

C. VALUES INTEGRATION
“Okay, that ends our discussion about the legal,
ethical and societal issues in media and
information.”

“For now, let’s have a recap.”

“What do you call about it is a kind of crime that


involves a computer and a network. The computer
may have been used in the commission of a crime,
or it may be the target.?

“Yes Miss _________?

(students are counting)

“Yes, you are correct Miss ___________!”

“I need another hand, Mr._________ can you give


me some tips in order the Sexual Predators will be
stop?”

“Well, very good Mr. ___________.”

D. APPLICATION
“Let’s have a grouping. We have an activity to
do!”
Instruction: I will divide you into two groups.
Each group will Demonstrate proper conduct and
behavior online (netiquette, virtual self).

“Okay, let’s count!”

“Times up!”

“You have only 15 mins to discuss with your


teammates, and after that lets proceed to our
reporting. First presenter is the Group 1 to be
followed by Group 2.”

“Start now!”

IV. ASSESSMENT
Direction: (In a 1 whole sheet of paper). Encircle the letter of your answer.

Encircle the letter of your answer.

1. What types of work are copyrighted?


A. Dramatic B. Musical
C. Graphical D. Speeches
E. Literary
a. A , B, C only b. B & C only
c. A & C only d. All of the above

2. When does someone get copyright protection?


a. When the author gets paid.
b. As soon as the work is created. c. When it is published with a © symbol.
d. When it is registered for copyright.

3. What happens to the work after the copyright time has passed?
a. It can be bought.
b. There is no time-limit on copyright.
c. The work must be destroyed.
d. It goes into the public domain.

4. Plagiarism is
a. Including other people's ideas in your paper
b. Using someone's ideas in your paper, but not citing (crediting) the source
c. Directly quoting a source instead of using your own words
d. Photocopying other people’s work

5. In case of cyberbullying, you should:


a. Respond to the bully and fight back if necessary
b. Block the cyberbully from your contacts list and talk to a trusted adult
c. Wait in silence until things get better
d. Play with the bully

Direction: Write a short reflection at the back of your paper on the following quotation:
“Technology is a queer thing. It brings you great gifts with one hand, and it stabs you in the back
with the other.”

V. ASSIGNMENT

Direction: Make an interview about issues happened to you or to your friends or in your community
regarding on the topic we discussed.
What issues happened and why did they happen?
What is their response on the issue they face?

You might also like