MEDIA AND INFORMATION LITERACY information to improve learning in all subject
areas, and to gain lifelong knowledge and skills
1ST QUARTER EXAM REVIEWER in the 21st century." Where media and
information literacy are concerned with the use
of messages from
COMMUNICATION
various media sources, technology literacy
focuses on the responsible and effective use of
Communication- Communication is taken from tools or networks to access, evaluate and
the Latin word commūnicāre, which means “to generate the message.
share” or “to divide out”
THE EVOLUTION OF TRADITIONAL TO
Communication is a process of sharing ideas NEW MEDIA
and opinions about issues, people, events and
places between or among persons through As a media and technology literate individual,
various channels to gain common understanding. you need to know where all the technology that
you get comes from. You also have to
Media Literacy understand how different media forms function.
Bautista et al (2016) from New Mexico-based Now, where those media come from? How in
Media Literacy Project (MLP) describes media the past did the people connect without the use
literacy as the “accessibility, review, assessment of media? How did the media develop through
and media development. Media literacy is the the years?
method by which media content is dissected for
critical analysis.
To do so, it is important to look at the
underlying meanings of media content, its
ownership and control, as well as how they are
portrayed.
Information Literacy
According to the American Library Association,
(2000) Information literacy is a collection of
skills requiring individuals to identify when
knowledge is needed and have
the ability to efficiently find, assess and use the
necessary information. It aims at
encouraging individuals to efficiently search,
analyze and use information. While media
literacy focuses on understanding, using, and
producing messages from
different media, information literacy is the
ability to effectively and sensibly find, evaluate,
and utilize information.
Technology Literacy
Bautista et al (2016) from the Department of
Education in Colorado (2009) describes
technology
literacy as "the ability to use effective
technology to interact, solve problems, navigate, How the evolution of media shaped the norms
handle, incorporate, analyze, develop and and values of the people in the society?
generate
Through the decades, the media's significant role
in people's lives has grown. From simple task to
disseminating information, the use of media has
become diversified and personal. The invention
of gadgets has redefined its values to its users.
Media is no longer just a source of information.
Press is no longer a pure information source. It
helps bridge the differences in cultural, political,
and social matters. This ties people and nations
together, and encourages reform, and develops
innovations and community advancement.
TYPES OF MEDIA
FUNCTIONS OF COMMUNICATION AND
MEDIA In mass communications and journalism, there
are different ways messages are distributed to
The mass media has a variety pf general and consumers. With the changing society today,
particular roles. Here are some of the media many individuals use various social media
functions of media and communication. platforms to find out information. In this lesson,
you will learn the nature of news as being
presented through the
different types of media—print, broadcast,
online.
Print Media – This is the printed version of
news, primarily from newspaper and
magazine and other publications.
Example: newspaper, newsletters, magazines,
banners, books, billboards and
brochures.
Broadcast Media – It is the most convenient
means to transmit information to the
vast audience.
Examples: radio, film/movie, Television
New (Online) Media – These are forms of
electronic communication made through the use
of computer technology such as Internet.
Examples: website and blogs, streaming audio
and video, email and social media
Nature of news through the different types of
media (print, broadcast, online).
Print news is considered tangible information
structured to be reread. It provides a level of
depth, context and information that television
and radio cannot supply.
Broadcast news is brief. Instead of measuring
the news in inches, broadcast journalists
measure stories in minutes and seconds. They networks and organizational computer
boil issues down to their basics, and write it as facilities around the world.
concise as possible.
MEDIA AND INFORMATION
The news in New (Online) Media is more LANGUAGES GENRE, CODES
flexible than in print and broadcast media. AND CONVENTIONS
Online news can be published faster because it
does not have traditional editor unlike the DIFFERENTIATING MEDIA MESSAGES
traditional media. THROUGH GENRE
MEDIA CONVERGENCE
GENRE - comes from the French word
What is media convergence? According to meaning 'type' or 'class‘can be recognized by its
Chakavaneh and Bogen (2007), “Media common set of distinguishing features (codes
convergence is a theory in communications and conventions)
where every mass medium eventually merges to
the point where they become one medium due to What are codes and conventions?
the advent of new communication technologies." CODES - are systems of signs, which create
meaning
MEDIA AND INFORMATION SOURCES
INDIGENOUS KNOWLEDGE - Indigenous CONVENTIONS- are the generally accepted
knowledge (IK) is the local knowledge – ways of doing something
knowledge that is unique to a given culture or
society. IK contrasts with the international
Technical Codes
knowledge system generated by universities,
ways in which equipment is used to tell
research institutions and private
the story (camera techniques, framing,
firms. (Warren 1991)
depth of fields, lighting and exposure,
LIBRARY - Collection of sources
etc.)
of information and similar
Symbolic Codes
resources, made accessible to a defined
community for reference or borrowing. It show what is beneath the surface of
provides physical or digital access to material, what we see (objects, setting, body
and may be a physical building or room, or a language, clothing, color, etc. )
virtual space, or both. Written Codes
use of language style and textual layout
TYPES OF LIBRARY (headlines, captions, speech bubbles,
Academic Library – serves colleges language style, etc. )
and universities
Public Library – serves cities and
towns and all types
School Library – serves students from
kindergarten to grade 12
Special Library – are in specialized
environment, such as hospitals,
corporations, museums, the military,
private business, and the government.
INTERNET - It allows user-to-user FAKE NEWS
communication and transfer of data files
from one computer to another on the
network. An electronic communications Fake news is also known as junk news,
network that connects computer pseudo-news, or hoax news.
It is a form of news consisting of deliberate
disinformation or hoaxes spread via
traditional news media (print and broadcast) or
social media. Fake news is a neologism often
used to refer to fabricated news. This type of
news, found in traditional news, social media or
fake news websites, has no basis and is
presented
as being accurate.
Given below are the following Features or
Examples of Fake News:
LEGAL, ETHICAL, AND SOCIETAL
a. Clickbait - a form of false advertisement, ISSUES
uses hyperlink text or a thumbnail link that is IN MEDIA AND INFORMATION (PART 1)
designed to attract attention and to entice users INTELLECTUAL PROPERTY
to follow the link then read, view, or listen to its
contents. Example clickbait statements looks FAIR USE AND CREATIVE COMMONS
like this, “You'll be Amazed!” “It will Shock
you!” or “You Won't Believe What Happens Article XIV, Section 13 of the 1987
Next!”. Constitution
b. Propaganda - Stories that are created to “The state shall protect and secure the exclusive
deliberately mislead audiences, promote a biased rights of scientists, artists and other gifted
point of view or particular political cause or citizens to their intellectual property and
agenda. creations, particularly when beneficial to the
c. Satire/parody - is a type of parody presented people, for such period as may be provided by
in a format typical of mainstream journalism, law.”
and is called a satire because of its content.
d. Sloppy journalism - Sometimes reporters or Philippines Republic Act 8293
journalists may publish a story with unreliable The RA 8293 also known as the “Intellectual
information or without checking all of the facts Property Code of the Philippines” is an Act
which can mislead audiences. Prescribing the Intellectual Property Code and
Establishing the Intellectual Property Office,
a. Misleading headings - Stories that are not mandating its Powers and Functions which took
completely false can be distorted using effect on January 1, 1998.
misleading or sensationalist headlines.Biased or
slanted news - Media bias is the bias or What is intellectual property?
perceived bias of journalists and news producers refers to creations of the mind, such as
within the mass media in the selection of many inventions; literary and artistic works;
events and stories that are reported and how they designs; and symbols, names and
are covered. images used in commerce
IP is protected in law by, for
How is Fake News Spread? example, patents, copyright and tradema
rks, which enable people to earn
“When a post is accompanied by many likes, recognition or financial benefit from
shares, or comments, it is more likely to receive what they invent or create. By striking
attention by others, and therefore more likely to the right balance between the interests
be further liked, shared, or commented on” of innovators and the wider public
(Tandoc, Lim, and Ling, 2018) interest, the IP system aims to foster an
environment in which creativity and During the lifetime of the
innovation can flourish. LITERARY WORKS author plus 50 years after
World Intellectual Property death
Organization (WIPO) is the global
forum for intellectual property services, 25 years from the date of
ART
policy, information and cooperation creation
The World Intellectual Property
Organization (WIPO) is the UN agency PHOTOGRAPHIC
50 years from publication
responsible for treaties involving WORK
copyright, patent, and trademark laws.
WIPO can be a force for progressive AUDIO- VISUAL
50 years from publication
change, helping the world take into WORK
account public interest and development
needs. 50 years from year
SOUND RECORDING
recording took place
BROADCAST 20 years from date of
RECORDING broadcast
Valid for 10 years and may
TRADEMARK be renewed for a periods of
10 years
Valid for 20 years from
WHAT ARE THE DIFFERENT TYPES OF INVENTION PATENT
filing date application
INTELLECTUAL PROPERTY?
1. Copyright - a legal term used to describe the
2. Patent - an exclusive right granted for an
rights that creators have over their literary and
invention
artistic works
• provides the patent owner with the right
books, music, paintings, sculpture and to decide how - or whether - the
films, to computer programs, databases, invention can be used by others
advertisements, maps and technical 3. Trademarks - a sign capable of
drawings distinguishing the goods or services of one
enterprise from those of other enterprises.
INVENTION Trademarks date back to ancient times when
• something that has never been made craftsmen used to put their signature or "mark"
before, or the process of creating on their products.
something that has never been made • TM means the owner of the mark has
before common law rights even though the
• A new device, method, or process mark has not been registered while the
developed from study and ®, on the other hand, is only used for
experimentation marks that have been granted
Republic Act 8293 registration.
4. Industrial Design - constitutes the
INTELLECTUAL PROPERTY ornamental or aesthetic aspect of an article
CODE OF THE PHILIPPINES • may consist of three-dimensional
features, such as the shape or surface of
COPYRIGHT VALIDITY PERIOD an article, or of two-dimensional
features, such as patterns, lines or color
• An industrial design right protects only
the appearance or aesthetic features of a
product, whereas a patent protects an
invention that offers a new technical
solution to a problem. In principle, an
industrial design right does not protect
the technical or functional features of a
product.
• Such features could, however,
potentially be protected by a patent.
Find out more about patents.
5. Geographical Indications and Appellations LEGAL, ETHICAL, AND SOCIETAL
of Origin ISSUES IN
• signs used on goods that have a specific MEDIA AND INFORMATION (PART 3)
geographical origin and possess
qualities, a reputation or characteristics Plagiarism
that are essentially attributable to that
place of origin Plagiarism - the act of using another person's
• most commonly includes the name of words or ideas without giving credit to that
the place of origin of the goods. person
TRADE SECRET The practice of taking someone else's
work or ideas and passing them off as
Business Information which provides an one's own.
enterprise with a competitive edge.
Trade secrets are proprietary TYPES OF PLAGIARISM
procedures, systems, devices, formulas, Anyone who has written or graded a paper
strategies or other information that is knows that plagiarism is not always a black-and-
confidential and exclusive to the white issue. The boundary between plagiarism
company using them.
and research is often unclear. Learning to
recognize the various forms of plagiarism,
especially the more
ambiguous ones, is an important step in the fight
to prevent it. Plagiarism comes in various forms.
Sources Not Cited Sources Cited
The Ghost Writer The Forgotten Footnote
The Photocopy Misinformer
The Potluck Paper The Too-perfect Paraphrase
The Poor Disguise The Resourceful Citer
The Labor of The Perfect crime
Laziness
The Self-stealer
SOURCES NOT CITED paraphrase other arguments from those
1. The Ghost Writer sources without citation.
The writer turns in another’s work,
word-for-word, as his or her own. WHAT ABOUT IMAGES, VIDEOS, AND
MUSIC?
2. The Photocopy - Using an image, video or piece of music in a
The writer copies significant portions of work you have produced without receiving
text straight from a single source, proper permission or providing appropriate
without alteration. citation is plagiarism. The following activities
3. The Potluck Paper are very common in today’s society. Despite
The writer copies from several different their popularity, they still count as plagiarism.
sources, tweaking the sentences to make - Copying media (especially images) from other
them fit together while retaining most of websites to paste them into your own papers or
the original phrasing. websites.
4. The Poor Disguise - Making a video using footage from others’
The writer has altered the paper’s videos or using copyrighted music as part of the
appearance slightly by changing key soundtrack.
words and phrases.
5. The Labor of Laziness Performing another person’s
The writer takes the time to paraphrase copyrighted music (i.e., playing a
most of the paper from other sources cover).
and make it all fit together. Composing a piece of music that
6. The Self-Stealer borrows heavily from another
The writer “borrows” generously from composition.
his or her previous work. Certainly, these media pose situations in
which it can be challenging to determine
SOURCES CITED (BUT STILL whether or not the copyrights of a work
PLAGIRISM): are being violated.
For example:
1. The Forgotten Footnote - A photograph or scan of a copyrighted image
The writer mentions an author’s name (for example: using a photograph of a book
for a source, but neglects to include cover to represent that book on one’s website)
specific information on the location of - Recording audio or video in which copyrighted
the material referenced. music or video is playing in the background.
2. The Misinformer - Re-creating a visual work in the same medium.
The writer provides inaccurate (for example: shooting a photograph that uses
information regarding the sources, the same composition and subject matter as
making it impossible to find them. someone else’s photograph)
3. The Too-Perfect Paraphrase - Re-creating a visual work in a different
The writer properly cites a source, but medium (for example: making a painting that
neglects to put in quotation marks on closely resembles another person’s photograph).
text that has been copied word-for-word, - Re-mixing or altering copyrighted images,
or close to it. video or audio, even if done so in an original
4. The Resourceful Citer way. The legality of these situations, and others,
The writer properly cites all sources, would be dependent upon the intent and context
paraphrasing and using quotations within which they are produced.
appropriately.
5. The Perfect Crime The two safest approaches to take in regards
The writer properly quotes and cites to these situations is:
sources in some places, but goes on to 1) Avoid them altogether or;
2) Confirm the works’ usage permissions and AND DIGITAL ISSUES IN THE
cite them properly. PHILIPPINES
How can you avoid committing plagiarism? What is Digital citizenship?
is the norms of appropriate, responsible
Citing published work to support your ideas and technology use
statements when writing is necessary; it adds holistic and positive approach to
credibility to your work. There is, however, a helping children learn how to be safe
proper way to do and secure, as well as smart and
that so you will not be accused of plagiarizing effective participants in a digital world
someone’s work. Here are six ways to avoid
committing plagiarism (Turnitin, 2017):
Paraphrase: If you find information that fits
your written work, read it carefully then rewrite
it using your own words. Do not exactly copy
more than two consecutive words from it. If you
do, use quotation marks and properly cite their
source.
Cite: Follow the prescribed document The elements (9 elements of digital citizenship)
formatting guidelines (APA, MLA, Chicago, have also been organized under the principles of
etc.). A source citation usually includes the respect, educate and protect. These principles
author’s name and publication date. include elements to
Quote: When quoting directly, copy the exact help us to discuss the issues and ideas that are
word, phrase, sentence, or paragraph the author happening with respect to technology
wrote, then enclose in quotation marks. You do
not want to misquote anyone. Use block quotes,
but only if really needed. Any student should be
able to properly paraphrase most materials, so
WHAT IS DIGITAL DIVIDE?
whenever possible, avoid entire blocks of quote.
Cite quotes: When citing a quote’s source, When we talk about a gap between
include the page (for a book) or paragraph (for demographics and regions that have access to
web content) number. modern information and communication
Cite your own work: If you used information technology, and those don’t or have restricted
from previous access is called Digital Divide. It is the
personal work, cite it. Treat it the same way you inequality between groups to ACCESS,
would treat KNOWLEDGE and USE of Information and
someone else’s work. This will help you avoid Communication Technologies.
committing selfplagiarism.
Reference: Cite all of your references. This is THE DIGITAL FOOTPRINT
a way to acknowledge the hard work of the This is what you call the Digital Footprint. It is
people whose work helped you complete yours. a trail of data you create while using the
Internet. In includes the websites you visit,
LEGAL, ETHICAL, AND SOCIETAL emails you send, and information you submit to
ISSUES
online services.
IN MEDIA AND INFORMATION
DIGITAL CITIZENSHIP, NETIQUETTE,
DIGITAL FOOTPRINTS
"Netiquette varies from domain to domain."
(Shea, 1994) Depending on where you are in the
virtual world, the same written communication
can be acceptable in one area, where it might be
considered inappropriate in another. What you
text to a friend may not be appropriate in an
email to a classmate or colleague.
Rule 4: Respect other people's time and
Our digital footprints can have a powerful
bandwidth
impact on our future. This can be a scary
Electronic communication takes time: time to
thought, given that what's in our digital footprint
read and time in which to respond. Most people
isn't always in our control. Depending on how
today lead busy lives, just like you do, and don't
they manage it, this trail can be big or small, and
have time to read or respond to frivolous emails
harmful
or discussion posts. As a virtual world
or helpful. Leaving an online record is nearly
communicator, it is your responsibility to make
impossible to avoid; having that record be a
sure that the time spent reading your words isn't
positive one is entirely possible.
wasted. Make your written communication
meaningful and to the point, without extraneous
NETIQUETTE, INTERNET ADDICTION text or superfluous graphics or attachments that
AND CYBERBULLYING may take forever to download.
What is Netiquette? Rule 5: Make yourself look good online
• The word netiquette is a combination of One of the best things about the virtual world is
’net’ (from internet) and ’etiquette’. the lack of judgment associated with your
• set of rules for behaving properly online physical appearance, sound of your voice, or the
• respecting other users’ views and clothes you wear (unless you post a video of
displaying common courtesy when yourself singing Karaoke in a clown outfit.) You
posting your views to online discussion will, however, be judged by the quality of your
groups writing, so keep the following tips in mind:
The Core Rules of Netiquette • Always check for spelling and grammar
Rule 1: Remember the Human errors
When communicating electronically, whether • Know what you're talking about and
through email, instant message, discussion post, state it clearly
text, or some other method, practice the Golden • Be pleasant and polite
Rule: Do unto others as you would have others
do unto you. Rule 6: Share expert knowledge
The Internet offers its users many benefits; one
Rule 2: Adhere to the same standards of is the ease in which information can be shared or
behavior online that you follow in real life accessed and in fact, this "information sharing"
While it can be argued that standards of capability is one of the reasons the Internet was
behavior may be different in the virtual world, founded. So in the spirit of the Internet's
they certainly should not be lower. You should "founding fathers," share what you know! When
do your best to act within the laws and ethical you post a question and receive intelligent
manners of society whenever you inhabit answers, share the results with others.
"cyberspace." Would you behave rudely to
someone face-to-face? On most occasions, no. Rule 7: Help keep flame wars under control
Neither should you behave this way in the What is meant by "flaming" and "flame wars?"
virtual world. "Flaming is what people do when they express a
strongly held opinion without holding back any
Rule 3: Know where you are in cyberspace emotion." (Shea, 1994). As an example, think of
the kinds of passionate comments you might activities, social networking or compulsive
read on a sports blog. While "flaming" is not surfing of the web.
necessarily forbidden in virtual communication, According to Dr. Kimberly Young, the first
"flame wars," when two or three people psychologist to
exchange angry posts between one another, must document internet addiction, these disorders are
be controlled or the camaraderie of the group similar to impulse-control disorders. It can take
could be compromised. Don't feed the flames; the form of any of the following in the graph.
extinguish them by guiding the discussion back
to a more productive direction. BULLYING AND CYBER BULLYING
Rule 8: Respect other people's privacy It's a popular belief that Filipinos are one of the
Depending on what you are reading in the happiest people on earth. We like to have fun
virtual world, be it an online class discussion and make fun of things around us. If we look at
forum, Facebook page, or an email, you may be into our local sitcoms, online memes, newspaper
exposed to some private or personal information comics, we can surmise the things that we
that needs to be handled with care. Perhaps Filipinos find funny. These are jokes about
someone is sharing some medical news about a
physical characteristics (color, height, smell,
loved one or discussing a situation at work.
etc.),
Rule 9: Don't abuse your power language and speech (Bisaya, bulol),
Just like in face-to-face situations, there are and intellectual ability.
people in cyberspace who have more "power"
than others. They have more expertise in Cyber Bullying is posting, sending, or even
technology or they have years of experience in a forwarding
particular skill or subject matter. Maybe it's you unkind, harmful, negative, or embarrassing
who possesses all of this knowledge and power! images or texts on the internet, social networks,
Just remember: knowing more than others do or or on cell phones. There are two forms of cyber
having more power than others may have does bullying:
not give you the right to take advantage of 1) Direct in which one person makes fun of or
anyone. Think of Rule 1: Remember the human. intimidates another and
2) Bullying by proxy when others join in the
Rule 10: Be forgiving of other people's bullying of another person.
mistakes
Both are serious crimes and punishable by law.
Not everyone has the same amount of
experience working in the virtual world. And not Let's face it: Some online spaces can be full of
everyone knows the rules of netiquette. At some negative, rude, or downright mean behavior.
point, you will see a stupid question, read an
unnecessarily long response, or encounter BULLYING AND CYBER BULLYING IN
misspelled words; when this happens, practice THE PHILIPPINES
kindness and forgiveness as you would hope
someone would do if you had committed the The Anti-Bullying Act of 2013 (RA 10627)
same offense. If it's a minor "offense," you Republic Act No. 10627 is an act that requires
might want to let it slide. If you feel compelled All Elementary and Secondary Schools to Adopt
to respond to a mistake, do so in a private email Policies to Prevent and Address the Acts of
rather than a public forum. Bullying in their Institutions. This law finds
applicability in school-related bullying, student
INTERNET ADDICTION to student bullying in particular, which covers
those uttered in social media.
Internet addiction is a growing epidemic Cyber-bullying or any bullying done through the
characterized by a compulsive desire to interact use of technology or any electronic means is
online through internet gaming, gambling, cyber also
bullying punishable under the law.
In this law, Aquino classifies bullying into five
basic forms: physical, verbal, relational
aggression, cyberbullying,
and sexual bullying
Cybercrime Prevention Act of 2012
The Republic Act 10175 is an Act defining
cybercrime, providing for the prevention,
investigation, suppression and the imposition of
penalties therefore and for other purposes.
RA 10175 punishes content-related offenses
such as cybersex, child pornography and libel
which may be committed through a computer
system. This
Cybercrime law identifies standards of
acceptable behaviour for information and
communication technology (ICT) users.
Cyberbullying can be avoided when you
promote proper netiquette, foster mutual respect
and courtesy while using the internet. Let the
Republic Act 10175 or Cybercrime Prevention
Act of 2012 be a reminder to think before you
click.