MIL Presentation

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Topics for todays presentation:

-PRESENTING YOURSELF AND MANAGING IMPRESSION


-CYBERBULLYING
-INTERNET ADDICTION
-STEALING OR BORROWING
PRESENTING YOURSELF AND
MANAGING IMPRESSIONS
One of the ingoing campaigns on Internet use is the
responsible presentation of one's self and effective
management of impressions one creates. The tagline,
"Think before you click" just about summarizes the
campaign. It silmply means that before you post anything
on the Web, you have to think through the repercussions of
sharing that information. And if the infromation is meant to
be kept private or away from the prying eyes of the public,
you have to make sure that you keep these information as
secure as possible or not produce the information at all, if
necessary.
CYBERBULLYING
An ill-managed impression often invites
unwanted, offensive, and perhaps violent
responses from other people. You are familiar to a
situation like this as bullying. In this case of the
internet, cyberbullying has been one of the worst
kinds of flaming activities because innocent people
are victimized by this.
INTERNET
Forms of ADDICTION
Internet Addiction
Cybersex The internet has introduced a whole new experience to human
addiction civilization. You, being part of the Information Age, perhaps, have
Cyber- grown overly reliant on the Internet for almost everything. But
relationship excessive use of online media can interfere with certain
addictiom mechanisms that keep flame wars and cyberbullying at bay.
Net
compulsions
According to an article at HealthGuide.org, internet addiction,
Information "otherwise known as computer addiction, online addiction, or
overload Internet Addiction Disorder (IAD) is an impulse-control problem."
Computer
addiction
FORMS OF INTERNET
ADDICTION
Cybersex addiction - compulsive use of Internet pornography, adult chat rooms, or adult fantasy
role-play sites impacting negatively on real-life intimate relationships.

Cyber- relationship addiction - addiction to social networking, chat rooms, texting, and messaging to
the point where virtual, online friends become more important than real-life relationships with family
and friends.

Net compulsions - such as compulsive online gaming, gambling, stock trading, or compulsive use of
online auction sites often resulting in financial and job-related problems.

Information overload - compulsive Web surfing or database searching, leading to lower work
productivity and less social interaction with family and friends.

Computer addiction - obsessive playing of off-line computer games or obsessive computer


programming.
SIGNS OF INTERNET ADDICTION, OR COMPUTER
ADDICTION, THAT CAN BE OBSERVED MAY BE
THE FOLLOWING:

Being less conscious of the time sent online or with gadgets that enable Internet
access.
Failing to complete tasks or activities intended to be finished at the time you were
using the internet.
Having less time with friends and family.
Lack of remorse for your excessive Internet use.
Feeling more excited with Internet activities rather than physical activities.
STEALING OR BORROWING

Ideas do not emanate from your own personal knowledge or experience. More often than
not, you need to consult other sources. But when you do so, you probably sometimes find
yourself in a dilemma of how to untilize the information you have collected. Some may opt to
literally copy the information and pass it off as their own, or some will extend all effort to cite
their sources.

When the first situation happens, the person committed a grave sin in scholarship which is
called plagiarism. The American Association of University Professors defined plagiarism as
"taking over ideas, methods, or written words of another, without acknowledgment and with
the intention that they be taken as the work of the deciever."

According to Ballenger (2009), plagiarism persist "because of that awkward feeling of


reading someone else's words and having to make concerted effort to understand what they
mean, and then finding your own words to restate the ideas."
TYPES OF PLAGIARISM
The writer turns in another's work, word-for-word, as his or
The Ghost Writer

her own.

The writer copies significant portions of text straight from a


The Photocopy

single source, without altercation.

The writer tries to disguise plagiarism by copying from several


The Potluck
different sources, tweaking the
sentances to make them fit
Paper
together while retaining most of the original phrasing.

The Poor The Although the the writer has retained the essential content
Disguise of the source, he or she has altered

the paper's appearance


slightly by changing key words and phrase.
TYPES OF PLAGIARISM
The writer takes the time spent to paraphrase most of the
The Labor of

paper from other sources and make

it all fit together, isntead
Laziness
of spending the same effort on original work,

The writer "borrows" generously from his or her previous


The Self-Stealer

work, violating policies concerning

the expectation of
originality adopted by most academic institutions.

The writer mentions an author's name for a source, but


The Forgotten neglects to include specific information on the location of the

Footnote material referenced. This often masks other forms of


plagiarsm by obscuring source locations.

The writer provides inaccurate information regarding the


Misinformer

sources, making it impossible to find them.


TYPES OF PLAGIARISM
The writer properly cites a source, but neglects to put in
The Too-perfect qoutation marks text that has been copied worf-for-word, or
Paraphrase

close to it. Although attributing the

basic ideas to the source,
the witter is falsely claiming original presentation and
interpretaion of the information.
The writer properly cites all sources, paraphrasing and using
The Resourceful qoutations appropriately. The catch? The paper contains
Citer
almost no original work! It is sometimes

difficult to spot this
form of plagiarism because it looks like any other well-
researched document.
The writer properly qoutes and cites sources in some places,
The Perfect but goes on to paraphrase other arguments from those
Crime
sources without citation. This way,

the writer tries to pass off

the paraphrased material as his or her own analysis of the


cited material.
You may have noticed that the entire module is dedicated for you to acquire the
knowledge on and the attributes of an ethical user of media and information.
Teodore and De Jesus (2007) argued that recognizing and promoting the basic human
values guide ethical journalism. Because journalism is a practice that entails
management and sharing of information, it is safe for you to adopt these values in
your own handling of information in your daily life.

Ethical use of information means using information ethically and properly.


BASIC HUMAN VALUES
Demands both factual and contextual accuracy (requires practitioner to check
Truth-telling and recheck information by including the capacity to anticipate possibilities of
error, as well as alertness tovquestionable or biased information)

Justice Fairness in the presentaion of all sides of a given issue

Not limited to the absence of government control or regulation; a neccessary


Freedom
condition for the descharge of the information function

Humaneness Keeping the names of crime victims, women, and minors.

Journalists become responsible stewards of the media when they value


Stewardship
and observe the basic responsibilities of their craft.
THANK YOU

You might also like