Media and Information Language still giving on impression of Media Language the whole subject. o Codes, conventions, formats, Medium Close-up (MCU) symbols and narrative structures o Half way between mid shot that indicate the meaning of and close up. media messages to an audience. Close Up (CU) Codes o A certain feature or part of o Systems of signs that when put the subject takes up the together create meaning. whole frame. o Semiotics- study of signs Extreme Close Up (ECU) o TYPES OF CODES o The ECU gets right in the Symbolic Codes- shat is and shows extreme detail. beneath the surface of what we ADVANCE CAMERA SHOT see (objects, setting, body Cut-in language, clothing, color, etc.) Show some part of the or ironic symbols that are easily subject in detail. understood. Cut away Examples are A shot of something other red-stop than the subject green-go Two Shot A shot of two people, framed yellow-slow down similarly to a mid shot. Written codes- Use of language Over-the-shoulder style and textual layouts Looking from a person at the (headlines, captions, speech subject. bubbles, language styles, etc.) Noddy Shot Technical Codes- are ways in Usually refers to a shot of which equipment is used to tell the interviewer listening and the story. reacting to the subject Sounds, camera Point-of-View angles and types Looking/shows a view of of shots and from the subject’s lighting and perspective. camera technique. Weather Shot BASIC CAMERA SHOT The subject is the weather Extreme Wide Shot (EWS) can be used other purposes. o View far from the object that CAMERA ANGLES he isn’t even visible often Bird’s Eye View used as an establishing shot. o This show a scene from Very Wide Shot (VWS) directly overhead, a very o The subject is visible unnatural and strange angle. (barely), but the emphasis is High Angle still on placing him in his o The Camera is elevated environment. above the action using a Wide Shot (WS) crane to give a general view. o The subject takes up the full Eye Level frame or at least as much as o A fairy neutral shot comfortably possible. Mid Shot (MS) o The camera is positioned as much through it is a human Legal, Ethical, and Societal Issues in actually observing a scene. Media and Information Low Level o This increase height and Republic Act No. 10175 (Cybercrime gives a sense of speed of Prevention Act of 2012) confusion. Is a law in the Philippines approved Warm’s-eye View on September 12, 2012 o A view of an object from Aims to address legal issues below as though the concerning online interaction and observer were a worm. Internet. Dutch/conted Angle Cybercrime offenses: o Sometimes the camera is o Cybersquatting tilted to suggest imbalance, o Cybersex transition and instability. o Child Pornography CAMERA MOVEMENTS o Identity Theft Pan Shot o Illegal Access to data o Moving the camera lens to o Libel one side or another. Look to Cyber- relating to, or involving your left, then look to your computer networks (such as the right. Internet) Tilt Cyberspace- refers to the virtual o Moving the camera lens up computer world, and more specifically, is or down while keeping its an electronic medium used to form a horizontal axis constant. Nod global computer network to facilitate your head up and down- this online communication. is tilting Cybercrime- refers to the criminal Truck activities carried out by means of o Tracking is like dolling, but it computers or the internet. involves motion left or right, Cyberbullying- the use of electronic truck left mean “move the communication to bully a person, camera physically to the left typically by sending messages of an while maintaining its intimidating and threatening nature. perpendicular relationship.” Hacking- refers to the practice of Zoom modifying or altering computer software o Involves changing the focal and hardware to accomplish a that is length of the lens to make considered to be outside of the creator’s the subject appear closer or original objective further away in the frame. Hackers- individuals who engage Dolly in computer hacking activities. o This is a motion towards or Phishing- is the attempt to obtain motion from the name come sensitive information such as from the old “dolly tracks” usernames, passwords, and credit card that used to be laid down for details (indirectly, money), often for the heavy camera to move malicious reasons, by disguising as a along. trustworthy entity in an electronic communication. Pedestal Illegal Downloading- refers to o Moving the camera up or obtaining files that you do not have the down without changing its right to use from the internet. vertical and horizontal axis. Digital Piracy- the practice of illegally copying and selling digital music, video, o Types of Plagiarism computer software, etc. 1. SOURCE NOT CITED Identity Theft- Is the deliberate use of a. The Ghost Writer- the writer someone else’s identity, usually as a turn in another’s work, word- method to gain a financial advantage or by-word, as his or her own obtain credit and other benefits in the b. The Photocopy- the writer other person’s name, and perhaps to the copies significant portion s of other people’s disadvantage or loss. text straight from single Cyber Defamation- is an unprivileged source, without alteration false statement of fact which trends to c. The Potlack Paper-The writer harm the reputation of a person or copies several different company. sources, tweaking the TWO TYPES OF CYBER sentences to make them fit DEFAMTION together while retaining o Libel- Written most of the original phrasing. o Slander- Verbal d. The Poor Disguise- The writer Child Pornography has altered the paper’s appearance slightly by Cybersex- also called computer sex, changing key words and internet sex, netsex. phrasing. 1. Is a virtual sex encounter in e. The Labor of Lazier- the which two or more people writer takes the time to (connected remotely via paraphrase most of the internet) send each other paper from other sources sexually explicit contents or and make it all fit together. sexually explicit Act. f. The Self-stealer- the writer Child Pornography- is a form of child borrows generously from his sex exploitation. or her previous work. Cybersquatting- is registering, 2. SOURCES CITED trafficking in, or using an internet a. Forgotten Footnote- the domain name with bad faith intent to writer mentions an author’s profit from the goodwill of trademark name for a source, but belonging to someone else. neglects to include specific Copyright- a legal device that gives the information on the location creator of a literary, artistic, musical, or of the materials referred. other creative work the sole right to b. Misinformer- the writer publish and sell that work. provides inaccurate o Violation of a copyright is called information regarding the infringement sources, making it Plagiarism- an act or instance of using impossible to find them. or closely imitating the language and c. To perfect Paraphrase- the thoughts of another author without writer properly cites a authorization; the representation of the source, but neglects to put in author’s work as one’s own, as by not quotation marks on text that crediting the original author. has been copied. d. Resourceful Cites- The writer properly cite all resources, paraphrasing and using quotations properly and appropriately. The catch? The paper contains no original work. e. The Perfect Crime- the writer properly quotes and cite sources in some places but goes on to paraphrase other arguments from the source without citation. Fair Use- is a legal concept that allows the reproduction of copyrighted material for certain purposes without obtaining permission and without paying. Computer Addiction- the excessive use of computers to the extent that is interferences with daily life. Digital Divide- An economic inequality between groups in term of access to use or, or knowledge of ICT. Virtual Self- the persona you create about yourself virtually. Netiquette- the correct or acceptable way of communicating on the internet.
(Mathematics in Industry 13) Wil Schilders (auth.), Wilhelmus H. A. Schilders, Henk A. van der Vorst, Joost Rommes (eds.) - Model order reduction_ theory, research aspects and applications-Springer-Ve