Professional Documents
Culture Documents
PMAA
PMAA
The media and information age, especially the Internet, gave tons of people access to
tools for communication and media creation but also opened up many legal loopholes and
ethical challenges. Given its widespread use and the vast majority who now have access to
an array of information, media and information has been the subject of legal, ethical, and
societal problems. While its positive implications are undeniable, there are issues that come
along with it.
What I Know
Pretest
Let’s see how much you already know before we tackle the next lesson. Write the letter
of your choice on a separate sheet of paper.
1. The writer provides inaccurate information regarding the sources, making it impossible to
find them.
A. The Misinformer C. The Perfect Crime
B. The Resourceful Citer D. The Self-Stealer
3. The writer properly cites all sources, paraphrasing and using quotations appropriately
A. The Misinformer C. The Perfect Crime
B. The Resourceful Citer D. The Self-Stealer
4. The writer properly quotes and cites sources in some places, but goes on to paraphrase
other arguments from those sources without citation.
6. The writer takes the time to paraphrase most of the paper from other sources and make it
all fit together
7. The writer copies from several different sources, tweaking the sentences to make them fit
together while retaining most of the original phrasing.
8. The writer copies significant portions of text straight from a single source, without alteration
9. A legal device that gives the creator of a literary, artistic, musical, or other creative work
the sole right to publish and sell that work
A. Cyberbullying C. Patent
B. Fair Use D. Copyright
10. Means you can use copyrighted materials without license only for certain purposes.
A. Cyberbullying C. Patent
B. Fair Use D. Copyright
What’s In
Review
In the previous lesson, you have learned that meanings are produced through the use
of codes and conventions and that media carry these meanings along with the messages or
information they relay. All the codes, conventions, and languages are tools for understanding
and interpreting media contents or messages, tools that are essential in creating a sound and
valid content analysis. With numerous information that is available today, being able to
sensibly understand media content would provide media consumers more effective ways of
selecting and utilizing information.
What’s New
Activity 8.1
Activity 8.1: The following terms are all associated with the ethical and legal use of
media and information. These concepts will be discussed in this lesson. But before you
proceed, try to figure out what these terms are by filling out the blank boxes.
1. C R G
2. F R U E
3. N E R T
4. N E Z N S P
5. E T Q E T E
6. C B B L L I G
7. D D C O N
8. P A G R I M
9. R G H
10. L M W S
What is It
Discussion
Intellectual Property
Intellectual property (IP) refers to creations of the mind, such as inventions; literary and
artistic works designs and symbols, names and images used in commerce
Types of Intellectual property
Copyright - a legal device that gives the creator of a literary, artistic, musical, or other creative
work the sole right to publish and sell that work. Copyright owners have the right to control the
reproduction of their work, including the right to receive payment for that reproduction. An
author may grant or sell those rights to others, including publishers or recording companies.
Violation of a copyright is called infringement.
Plagiarism
Plagiarism is an act or instance of using or closely imitating the language and thoughts
of another author without authorization; the representation of that author's work as one's own,
as by not crediting the original author.
Types of Plagiarism
Sources Not Cited
1. The Ghost Writer -The writer turns in another’s work, word-for-word, as his or her
own.
2. The Photocopy- The writer copies significant portions of text straight from a single
source, without alteration.
3. The Potluck Paper- The writer copies from several different sources, tweaking the
sentences to make them fit together while retaining most of the original phrasing.
4. The Poor Disguise- The writer has altered the paper’s appearance slightly by
changing key words and phrases.
5. The Labor of Laziness - The writer takes the time to paraphrase most of the paper
from other sources and make it all fit together.
6. The Self-Stealer- The writer “borrows” generously from his or her previous work.
Sources Not Cited(BUT STILL PLAGIARIZED)
1. The Forgotten Footnote - The writer mentions an author’s name for a source, but
neglects to include specific information on the location of the material referenced.
2. The Misinformer - The writer provides inaccurate information regarding the sources,
making it impossible to find them.
3. The Too-Perfect Paraphrase- The writer properly cites a source, but neglects to put
in quotation marks on text that has been copied word-for-word, or close to it.
4. The Resourceful Citer- The writer properly cites all sources, paraphrasing and using
quotations appropriately. The catch? The paper contains almost no original work!
5. The Perfect Crime- The writer properly quotes and cites sources in some places,
but goes on to paraphrase other arguments from those sources without citation.
Directions: Answer the questions briefly. Write your answers in a separate sheet of
paper
Case 1: Plagiarism
Read the following articles on a case of plagiarism: "UP student plagiarizes prize-
winning photos" (Source Link: https://www.rappler.com/move-ph/39566-up-student-
admits-plagiarized-photos)
Fair Use
Fair use means you can use copyrighted materials without license only for certain purposes.
These include:
1. Commentary
2. Criticism
3. Reporting
4. Research
5. Teaching
Activity 8.3: With what you have learned so far, cite a situation, which is most likely
for you to experience, where you could apply your knowledge on intellectual property
right, copyright, and fair use guidelines. Include a simple illustration of such situations.
Copyright _____________________________
_____________________________
_____________________________
_____________________________
_____________________________
2. _____________________________
_____________________________
_____________________________
_____________________________
_____________________________
Remember the human – remember that the receiver on the other side of your computer
or phone is another human person capable of understanding, feeling, and getting hurt. Putting
yourself in others’ place can put everything in the right perspective. Before you send that
message, upload that photo, or send that tweet, ask yourself: How would the other person or
people at the end of the line feel if I do or say this? Always put in mind that empathy is one of
the most powerful motivations for some basic decency online.
Rule 2: Adhere to the same standards of behavior online that you follow in real life
Good netiquette is derived from the same standards set in real life. While it can be
argued that standards of behavior may be different in the virtual world, they certainly should
not be any lower. In real life, we are constantly reminded to be respectful to other people,
mindful of our words, follow the law, and other societal rules. This holds true for cyberspace
etiquette as well. Further, actions have consequences. Whatever is deemed illegal or
irresponsible in real life is most probably deemed the same in the online world. While the
chances of getting caught or punished may be slim, your accountability and liability for your
actions aren’t totally erased. Thus, you should do your best to act within the laws and ethical
standards in online environment just as you would in real life.
On the other hand, the word "bandwidth" is sometimes used synonymously with time,
but it's really a different thing. Bandwidth is the information-carrying capacity of the wires and
channels that connect everyone in cyberspace (Shea, 1997). However, these bandwidths
have a limit as to the amount of data it can carry at a given moment. All those unnecessary
data uploaded in cyberspace is taking up space in the bandwidth that could’ve been reserved
for more valuable data.
Remember, do not feed the flames; extinguish them by guiding the discussion back to
a more productive direction. Furthermore, opinions are always welcomed to be voiced out but
at the end of the day, parties may just agree to disagree and end a conversation in a decent
way.
Wherever you are in the online world, you may be exposed to some private or personal
information that needs to be handled with care. Ask yourself: What do you think would happen
if this information "got into the wrong hands?" Embarrassment? Hurt feelings? Loss of a job?
Just as you expect others to respect your privacy, so should you respect the privacy of others
as well.
Moreover, always choose your battles wisely. Not every mistake or opposing opinion
you see on the Internet needs your reaction. Do not sweat over the small stuff or things that
do not have much weight and just let it slide. Conversely, learn to admit your mistakes as well
should there be instances when you commit one. No one is perfect, and so are you. So
practice changing your opinion when presented with facts and learn to acknowledge your
errors or inaccuracies.
Alternatively, you can follow the THINK acronym to guide you on how you show behave
and interact on the Internet or on social media. This applies to everyday communication too,
whether you’re talking to work colleagues, family, or friends.
THINK
T – Is it true?
Is this fact or is it really an opinion or feeling?
Know and be clear before you speak
H – Is it helpful?
Will it just aggravate the situation if you do talk about it or post a rant about it?
Does it help you, them, or the situation?
I – Is it inspiring?
Will people be in awe after reading your status?
N – Is it necessary?
There are things that are better left unsaid.
Some people are making their social media account as daily/ routinely diaries
K – Is it kind?
What is your motivation for communicating?
Activity 8.4: Read and understand the comic strip below. Answer the questions that
follow on a separate sheet of paper.
Source: Carnegie Mellon University, Lesson 7: Netiquette (2017). Retrieved on June 26, 2020 from
https://www.carnegiecyberacademy.com/documents/Lesson7_Netiquette.pdf
1. What are the differences between talking to your friends or family over the
Internet and talking to them in person?
There may have been a time in your life when your parents or elder relatives asked
you to teach them what to click on their mobile phone or how to navigate through the Internet.
That is an example of a digital divide between digital natives and digital immigrants. This divide
doesn’t necessarily mean that the elderly do not have access per se but some are simply not
comfortable with the use of digital devices and the Internet. However, this does not hold true
to some as there are digital immigrants who accepted the advent of technology and sought to
learn to adapt to the digital age.
On a more personal level, you may have known a student who have struggled to do a
homework or submit a project because it involves a certain device or it needs Internet
connection. Perhaps a friend? A classmate? A neighbor? Or that someone may even be you.
Access to all the Internet and all these technological advancements is a privilege not
all are able to afford. In a country like the Philippines where a huge chunk of our population
falls below poverty line, acquiring digital devices, let alone securing a stable Internet
connection, is at the bottom of the list of priorities.
Activity 8.5: Answer the following questions briefly and write your answers in a
separate sheet of paper.
1. Cite a real-life situation, whether a personal experience or that of someone you
know, showing the existence of digital divide.
2. Which among the mentioned three groups do you think that situation belongs?
3. Suggest a way to help narrow such digital gap.
Internet Addiction
Merriam-Webster Dictionary defines addiction as “a compulsive, chronic, physiological
or psychological need for a habit-forming substance, behavior, or activity having harmful
physical, psychological, or social effects.” When we speak of addiction, we commonly
associate it with substances like recreational or illegal drugs. However, due to the widespread
use of the Internet, the digital age has ushered an addiction that has become a growing
concern in the society – Internet Addiction.
Internet addiction may come in different forms such as social media addiction, video
game addiction, cybersex or online sex addiction, and online gambling addiction. Undeniably,
the Internet has introduced to society a whole new human experience. Aside from its
educational and informational functions, the Web has offered media users a higher and more
enjoyable level of recreation with all the games, social media, and even online shopping,
which, in effect, makes users more glued to their devices. Moreover, thanks to smartphones
and mobile internet data services, people can now access these almost anytime, anywhere!
More and more individuals are now developing a heightened dependence with these evolving
technologies, some at a manageable level but others at an alarming degree opening the
possibility of having their devices and the Internet interfere with their daily activities.
Internet addiction may be developed due to several factors like stress, anxiety,
depression, other forms of addiction, lack of social support, or lack of parental guidance, or
inactivity. These are some of the signs and symptoms of Internet addiction you may want to
be mindful of:
Being less conscious of time spent online or with gadgets that enable Internet
access
Failing to complete tasks or activities intended to be finished at the time you were
using the Internet
Having less time with friends and family
Lack of remorse for your excessive Internet use
Feeling more excited with Internet activities rather than real-life or physical
activities
What You Will Do
Cyberbullying
In 2012, a certain college student gained infamy after a video of her allegedly shouting
at a female security guard at LRT-2 Santolan went viral. She was subjected to severe ridicule,
hateful messages, and even threats and because of the abuse she was getting on media, she
deactivated all her social media accounts and even refused to leave her home. In 2013, a 12-
year-old Fil-Am student from New York took her own life after she was bullied due to a video
uploaded on YouTube where she was shown arguing with another classmate. In 2017, a
Grade 8 student from Ramon Torres National High School (RTNHS) in Negros Occidental
ended his own life because of cyber bullying after being bullied and sent disturbing messages
accusing him of stealing his classmate’s computer tablet.
Online violence, cyber bullying and digital harassment affect over 70 percent of young
people globally, according to the United Nations Children’s Fund (UNICEF), as it called on
internet users to “be kind online” and prevent this form of violence. These cases are only a
tiny fraction of this figure, just a few out of the countless victims of cyberbullying with some still
constantly battling the pains and demoralization while others, in extreme cases, succumbing
to suicide.
Activity 8.6: Name two of the possible health-related effects that cyberbullying can
have on a victim and explain each.
1. ___________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
2. ___________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
What’s More
Enrichment
Activity 8.7: Analyze the graphic below and answer the questions that follow briefly.
Write your answers in a separate sheet of paper
Source: https://www.esa.int/About_Us/Law_at_ESA/Intellectual_Property_Rights/What_is_intellectual_property
Guide questions:
1. What issues do you see in the poster?
2. What possible dangers and issues in the picture?
3. Which of these issues have happened to you or to your friends? Why did they
happen?
Activity 8.8: Explain what each photo represent and what rule of netiquette is violated.
Explain how the issues implied in these photos affect media consumers like you. Write
your answers on a separate sheet of paper.
1.
Source: https://medium.com/@firdausbakharia_67166/netiquette-online-manners-e122223d0505
2.
Source: https://www.victoriaadvocate.com/news/education/should-the-definition-of-bullying-include-
cyberbullying/article_1276accf-7740-5d64-ac6f-40778961ab91.html
3.
Source: https://virtuallybadges.weebly.com/station-5-netiquette.html
4.
Source: https://www.slideshare.net/BlackOps2/what-is-plagiarism-copyrighting-and-netiquette
Activity 8.9: Case Study on Cyberbullying
Read the news article about Robert Blair Carabuena and the Metropolitan Manila
Development Authority Aide Fabros: "Carabuena: From bully to cyberbullying
victim (Resource link: https://news.abs-cbn.com/lifestyle/08/23/12/carabuena-bully-
cyberbullying-victim)
What I Can Do
Application
The Internet and social media have been efficient mediums not only in social networking
or marketing products and services but also in lobbying certain advocacies and
campaigns. In this activity, you are to create a 3-week social media campaign which
aims to combat any of the following issues (Choose only one):
A. Digital Divide
B. Internet Addiction
C. Cyberbullying
Read along and follow the instructions specified on the next page.
1. Before starting the campaign, draft a campaign plan containing the following parts:
I. Goal of the campaign
Set your campaign goals
What do you aim to achieve by the end of your campaign?
II. Target audience
a. Understand your ideal target market
b. What demographic, age bracket, or groups of people do you intend to
mainly target with your campaign?
III. Channel
Choose your social media channel
Will you use Facebook? Instagram? Twitter? YouTube? TikTok? Or all of
them?
IV. Content Creation
a. For the span of the 3-week campaign, you are to produce three outputs:
1) Photograph, 2) Infographic, and 3) 1-minute video infomercial.
b. Conceptualize what focus each output should contain and decide on
what week you will upload your outputs. You should be able to publish
one output per week.
V. Create a calendar
a. Your social media campaign must work on a 3-week schedule. In this
part of your plan, outline your activities and content from beginning to
end.
2. By the end of the campaign, you are to create an accomplishment report with the
following parts:
I. Social media analytics
Report the campaign’s social media reach (likes and shares) and
engagement (shares and comments) of the posts.
II. Assess the overall impact of the campaign. Was your goal achieved? Did the
campaign reach your intended audience? Were you able to get your message
across?
III. Identify the challenges and difficulties you encountered in planning and
executing the social media campaign
IV. Lastly, suggest ways on how you can improve future social campaigns.
Encode and print these reports on an A4-sized bond paper. Attach with your report the
grading rubric found on the next page.
Excellent Good Fair Poor
Clear social media goals
Demonstrates realistic
and clear goals. Ex. Campaign goals are clear, Goals identified but group Goals identified but not
No goals identified
communications, well-defined, and realistic could have put more in it fulfilled
identifying market needs,
etc.
The project includes all
The project includes some
information relevant to the The project includes all
relevant information.
topic and is presented in a relevant information.
Content is somewhat The project is lacking in
Content well-organized fashion. Content is well organized.
Social Media Campaign Rubric
I. MULTIPLE CHOICE. Identify the correct answer to the following questions. Write the letter
of your choice on the space before the number.
______ 1. This is an act or instance of using or closely imitating the language and thoughts
of another author without authorization
a. Intellectual Property c. Plagiarism
b. Copyright d. Fair Use
______3. Fair use means you can use copyrighted materials without license only for certain
purposes. These reasons include all choices EXCEPT:
a. Reporting c. Research
b. Scamming d. Teaching
______ 4. This is a type of plagiarism where the writer copies from several different sources,
tweaking the sentences to make them fit together while retaining most of the
original phrasing.
a. The Ghost Writer c. The Perfect Crime
b. The Misinformer d. The Potluck Paper
______ 5. This is a type of plagiarism where the writer properly quotes and cites sources in
some places, but goes on to paraphrase other arguments from those sources
without citation.
a. The Ghost Writer c. The Perfect Crime
b. The Misinformer d. The Potluck Paper
______ 6. This refers to having the appropriate knowledge and skills to effectively use digital
technologies to communicate with others, participate in society and create and
consume digital content.
a. Netiquette c. Digital Citizenship
b. Netizenship d. Media consumerism
______ 7. This is what people do when they express a strongly held opinion on the Internet
without holding back any emotion
a. Flaming c. Arguing
b. Talking d. Discussing
______8. The acronym used to help you review your behavior online
a. CLICK c. NET
b. FEEL d. THINK
______ 9. The people who were born before the widespread adoption of computers and the
Internet and has had to adopt digital technology later in life are referred to as
__________.
a. Digital Natives c. Digital Citizens
b. Digital Immigrants d. Digital Netizens
______ 10. All of these choices are factors contributing to Internet addiction EXCEPT:
a. Depression c. Social belongingness
b. Anxiety d. Lack of parental guidance
II. Read each scenario below and identify if the situation manifests good or bad netiquette.
Write G for good netiquette and B for bad netiquette.
____ 1. Alexi wants to post a comment to an online message board. She really wants to
emphasize her opinion. She responds in ALL UPPERCASE LETTERS!
____ 2. Tina had a small disagreement on Facebook with her friend about a certain political
issue. She noticed that her friend started to get personal with her responses. Instead
for responding with anger, Tina told her friend that they could just agree to disagree.
____ 3. David is an Internet expert. He reads a question from a newcomer in an online
discussion group. For him the answer is easy but the "newbie" is having trouble. He
responds, "Hey newbie! Can't you read a book? Don't ask such a dumb question!"
____ 4. Andrew’s laptop got broken so he borrowed his classmate’s for an assignment he had
for school. As he opened the Internet browser, his classmate apparently left his
Facebook messenger open. Curious, Andrew browsed through his classmate’s
messenger.
____5. Aubrey noticed a factual error on her Facebook friend’s post. Instead of shaming or
mocking her, she privately messaged her friend and politely told her that her post has
an error and that she should correct it.
Additional Activity
Our Intellectual Property Rights are anchored on an actual law. In this activity, you will
further look into the actual law the where these rights are rooted. Follow the instructions
below:
1. Read the “The Intellectual Property Law of the Philippines”
Link: https://www.chanrobles.com/legal7code.htm#.XvXAbCgzbDc
2. Answer the following questions and write them on a separate sheet of paper:
a. What are example of copyright protected works under the Philippines Law?
b. What are example of works not protected by copyright?
c. What is the difference between original works and derivative works?
d. As a student, how can you promote ethical use of media and information?