0% found this document useful (0 votes)
68 views

Societal Issues

Uploaded by

Tinapay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views

Societal Issues

Uploaded by

Tinapay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 66

MEDIA AND INFORMATION

LITERACY (MIL)

Legal, Ethical, and Societal Issues in


Media and Information (Part 3)
Plagiarism

MIL PPT 18
Updated: June 11, 2017
VIDEO PRESENTATION

Understanding Plagiarism
YouTube Channel: YSJ ADD
Uploaded January 22, 2013,
Retrieved October 29, 2016 from
https://www.youtube.com/watch?v=cRJL82uhwyU
WHAT IS PLAGIARISM?
the act of using another person's words
or ideas without giving credit to that
person
http://www.merriam-webster.com/dictionary/plagiarism

Plagiarism
The practice of taking someone else's
work or ideas and passing them off as
one's own.
https://en.oxforddictionaries.com/definition/plagiarism
TYPES OF PLAGIARISM

Retrieved on October 29, 2016 from


http://www.plagiarism.org/assets/downloads/types_
of_plagiarism.doc.
Note:
Document provided by Turnitin.com and Research Resources. Turnitin allows free
distribution and non-profit use of this document in educational settings.
TYPES OF PLAGIARISM
Sources Not Cited Sources Cited
The Ghost Writer The Forgotten Footnote

The Photocopy Misinformer

The Potluck Paper The Too-perfect Paraphrase

The Poor Disguise The Resourceful Citer

The Labor of Laziness The Perfect crime

The Self-stealer
TYPES OF PLAGIARISM:
SOURCES NOT CITED
1. “The Ghost Writer”
➢The writer turns in
another’s work, word-
for-word, as his or her
own.

Source: http://rainbowriting.com/ghostwriter-resume/
TYPES OF PLAGIARISM:
SOURCES NOT CITED
2. “The Photocopy”
➢ The writer copies
significant portions
of text straight from
a single source,
without alteration. Source:
http://indianexpress.com/article/opinion/columns/p
hotocopying-books-for-students-copyright-high-
court-3075857/
TYPES OF PLAGIARISM:
SOURCES NOT CITED
3. “The Potluck Paper”
➢The writer copies from
several different sources,
tweaking the sentences
to make them fit together
while retaining most of
the original phrasing. Source: http://www.laweekly.com/restaurants/10-
potluck-etiquette-rules-2374604
TYPES OF PLAGIARISM:
SOURCES NOT CITED
4. “The Poor Disguise”
➢The writer has altered
the paper’s
appearance slightly
by changing key Source:
words and phrases. https://www.amazon.com/Accoutrement
s-Fuzzy-Glasses-Classic-
Disguise/dp/B000JNS2ZS
TYPES OF PLAGIARISM:
SOURCES NOT CITED
5. “The Labor of Laziness”
➢ The writer takes the time
to paraphrase most of
the paper from other
sources and make it all
fit together. Source:
https://heartofashepherd.com/2015/07/06/proverbs-69-
11-failing-to-instill-a-daily-discipline-of-study-and-labor-
in-your-child-allows-the-laziness-of-a-sluggard-to-
become-a-predictable-path-to-poverty-and-sorrow-2/
TYPES OF PLAGIARISM:
SOURCES NOT CITED
6. “The Self-Stealer”
➢ The writer
“borrows”
generously from his
or her previous
work.
Source: http://com1010.library.wayne.edu/
TYPES OF PLAGIARISM:
SOURCES CITED (BUT STILL
PLAGIARIZED)
1. “The Forgotten Footnote”
➢ The writer mentions an
author’s name for a source,
but neglects to include
specific information on the
location of the material
referenced. Source:
http://drennank.wonecks.net/2011/08/12/forgot
-to-register/
TYPES OF PLAGIARISM:
SOURCES CITED (BUT STILL
PLAGIARIZED)
2. “The Misinformer”
➢The writer provides
inaccurate information
regarding the sources,
making it impossible to
find them.
Source: https://itunes.apple.com/us/app/pinocchio-
for-ipad-iphone/id422133774?mt=8
TYPES OF PLAGIARISM:
SOURCES CITED (BUT STILL
PLAGIARIZED)
3. “The Too-Perfect
Paraphrase”
➢The writer properly cites
a source, but neglects to
put in quotation marks
on text that has been
copied word-for-word, or
Source: http://www.webslaw.com/how-to-craft-
close to it. the-perfect-lawyer-bio.php
TYPES OF PLAGIARISM:
SOURCES CITED (BUT STILL
PLAGIARIZED)
4. “The Resourceful Citer”
➢The writer properly cites all Source:
http://w

sources, paraphrasing and ww.free


pik.com/

using quotations free-


photo/y

appropriately. The catch? oung-


man-

The paper contains almost holding-


many-

no original work! books_8


57159.ht
m
TYPES OF PLAGIARISM:
SOURCES CITED (BUT STILL
PLAGIARIZED)
5. “The Perfect Crime”
➢The writer properly
quotes and cites sources in
some places, but goes on
to paraphrase other
arguments from those
sources without citation. Source:
http://www.manilaspeak.com/commentary/
plagiarism%E2%80%95an-academic-crime
WHAT ABOUT IMAGES, VIDEOS, AND MUSIC?
SOURCE: HTTP://WWW.PLAGIARISM.ORG/PLAGIARISM-101/WHAT-IS-
PLAGIARISM/

Source: https://www.sagaftra.org/musicvideos
WHAT ABOUT IMAGES, VIDEOS, AND MUSIC?
SOURCE: HTTP://WWW.PLAGIARISM.ORG/PLAGIARISM-101/WHAT-IS-
PLAGIARISM/

Without receiving proper permission or providing


appropriate citation, the following are considered
plagiarism:
Copying media (especially images) from other websites
to paste them into your own papers or websites.

Making a video using footage from others’ videos or


using copyrighted music as part of the soundtrack.
WHAT ABOUT IMAGES, VIDEOS, AND
MUSIC?
SOURCE: HTTP://WWW.PLAGIARISM.ORG/PLAGIARISM -
101/WHAT-IS-PLAGIARISM/

Without receiving proper permission or providing


appropriate citation, the following are considered
plagiarism:
Performing another person’s copyrighted music
(i.e., playing a cover).
Composing a piece of music that borrows heavily
from another composition.
FORMATIVE ASSESSMENT:
RECITATION
Questions
1. What is plagiarism?
2. What are the different types of
plagiarism? Give an example.
3. Why is it important to
understand the different types
of plagiarism? Source: http://www.plagiarism.com/
FORMATIVE ASSESSMENT:
RECITATION
Questions
3. Why should you avoid
plagiarism?
4. How can you avoid
plagiarism?
Source: http://www.plagiarism.com/
FAMOUS CASES OF PLAGIARISM
IN THE PHILIPPINES
MVP in Hot Water Over ‘Plagiarized' Speech
ABS-CBN News
YouTube Channel: ABS-CBN News
Uploaded April 4, 2010,
Retrieved October 29, 2016 from
https://www.youtube.com/watch?v=cRJL82uhwyU
FAMOUS CASES OF PLAGIARISM
IN THE PHILIPPINES
24Oras: Tito Sotto, Nanindigang Hindi
Siya Nag-plagiarize
YouTube Channel: GMA News and Public Affairs,
Uploaded Nov. 13, 2012,
Retrieved October 29, 2016 from
https://www.youtube.com/watch?v=VZnkflY0L-c
FAMOUS CASES OF PLAGIARISM
IN THE PHILIPPINES
Saksi: Exclusive: UP Graduate Student na Nag-
plagiarize ng Litrato sa mga Contest, Nag-sorry

YouTube Channel: GMA News and Public Affairs


Uploaded September 24, 2013,
Retrieved October 29, 2016 from
https://www.youtube.com/watch?v=HptWz86Fve0
FORMATIVE ASSESSMENT:
RECITATION
Question
1. How was plagiarism
committed in these events?
2. How could have those
personalities avoid
plagiarism?
3. Why does plagiarism
matters? Source: http://www.plagiarism.com/
REFERENCES

Media and Information Literacy by Boots C. Liquigan,


Diwa Learning Systems Inc.
http://www.plagiarism.org/plagiarism-101/what-is-
plagiarism/
http://www.plagiarism.org/assets/downloads/types
_of_plagiarism.doc
https://www.ox.ac.uk/students/academic/guidance/s
kills/plagiarism?wssl=1
https://www.youtube.com/watch?v=cRJL82uhwyU
CYBERCRIME
the use of a computer as an instrument to
further illegal ends

criminal activity or a crime that involves the


Internet, a computer system, or computer
technology
REPUBLIC ACT NO. 10175

Cybercrime Prevention Act of 2012


Addresses crimes committed against and through computer
systems on 12 September 2012. It includes penal
substantive rules, procedural rules and also rules on
iternational cooperation.
COMMON TYPES OF CYBERCRIME
INTERNET FRAUD

This type of scam usually asks people to


send money promising a much larger sum
in the short term.
PHISHING SCAMS

One of the main forms of social


engineering attacks, and as any social
engineering attack it tries to trick
unsuspecting users into giving away
personal information.
ONLINE INTELLECTUAL PROPERTY
INFRINGEMENTS
This vary from the sale of counterfeit or
replica goods, content piracy, patent
infringement and more.
ONLINE INTELLECTUAL PROPERTY
INFRINGEMENTS
Counterfeit and replica goods: Product created to look identical to an
existing product made by a third party’s brand.

Piracy: Piracy is the unauthorized reproduction, copying and spreading


of copyrighted materials.

Patent infringement: These are products which exactly copy the


functionality and mechanism of products protected by utility patents.
IDENTITY THEFT

This occurs when someone uses another


person’s personal identifying information, like
their name, identifying number ,or credit card
number without their permission, to commit
fraud or other crimes.
FOUR TYPES OF IDENTITY THEFT
MEDICAL IDENTITY THEFT- Occurs when individuals identify
themselves as another to procure free medical care.

CRIMINAL IDENTITY THEFT- generally takes place when


one identifies himself or herself as someone else during an
arrest to avoid a summons, detection of a warrant in their
real name or to evade an actual arrest or conviction.
FOUR TYPES OF IDENTITY THEFT
FINANCIAL IDENTITY THEFT- is the most common. It occurs when
someone uses another person’s information to attain goods,
services or information.

CHILD IDENTIY THEFT- common among those who know the child
and understand that the child may be used to gain employment
or a residence.
CYBERBULLYING

A form of harassment or bullying inflicted


through the use of electronic or communication
devices such as computers, mobile phone,
laptops, etc.
TYPES OF CYBERBULLYING
CYBERSTALKING
The use of electronic communication by a
person to follow a person, or attempts to
contact a person to foster personal interaction
repeatedly despite a clear indication of
disinterest by such person.
TYPES OF CYBERBULLYING
EXCLUSION
A cyberbully can intentionally leave someone
else out of an online group or message thread.
TYPES OF CYBERBULLYING
HARASSMENT
Occurs when a cyberbully sends persistent and
hurtful online messages to a victim.
TYPES OF CYBERBULLYING
OUTING
A cyberbully outs a victim by openly revealing
sensitive or personal information without their
consent. The bully does so in the hopes of
embarrassing or humliating the victim.
TYPES OF CYBERBULLYING
FRAPING
Occurs when a cyberbully uses a victim’s social
media accounts to post inappropriate content
with the victim’s name attached to it.
TYPES OF CYBERBULLYING
TROLLING
Cyberbully can troll victims by posting
derogatory comments about them online in the
hopes of hurting these individuals.
TYPES OF CYBERBULLYING
FLAMING
This consists of posting about or sending insults
and profanity to a victim.
TYPES OF CYBERBULLYING
DENIGRATION
Denigration usually consists of cruel rumors
and gossip about a victim.
TYPES OF CYBERBULLYING
IMPERSONATION
A cyberbully can impersonate a victim by
posting comments on social media and chat
rooms in the individuals name.
TYPES OF CYBERBULLYING
TRICKERY
A cyberbully can befriend a victim, to the
point where the targeted individual feels
comfortable sharing secrets and other sensitive
information.
TYPES OF CYBERBULLYING
FAKE PROFILES
A cyberbully can set up fake online profiles
on behalf of victims.
TYPES OF CYBERBULLYING
CATFISHING
A cyberbully exploits a victim’s emotions. A
cyberbully attempting to catfish a victim
creates a fake online identity and pretends to
be someone else.
CHILD PORNOGRAPHY
ALSO KNOWN AS CHILD SEXUAL ABUSE
MATERIAL(CSAM)
This is a form of child sexual exploitation.
Also refers to any representation, whether visual, audio or
written combination thereof, by electronic mechanical,
digital optical, magnetic or any other means of child
engaged or involved in real or stimulated explicit sexual
activities.
EXPLICIT SEXUAL ACTIVITY
1. Sexual intercourse or lascivious act
2. bestiality
3. masturbation
4. sadistic or masochistic abuse
5. lascivious exhibition of the genitals, buttocks, breasts,
pubic area and/or anus
6. Use of any object or instrument for lascivious acts
INTERNET ADDICTION
Characterized by excessive or poorly controlled
preoccupations, urges or behaviours regarding
computer use and internet access that lead to
impairment or distress.
TYPES OF INTERNET ADDICTION
CYBERSEX ADDICTION

- IS A SEXUAL ADDICTION THAT INVOLVES


VIRTUAL SEXUAL ACTIVITY ON THE INTERNET.
TYPE OF CYBERSEX

SEXTING
-SEX TEXTING, INVOLVES SENDING SEXUALLY
EXPLICIT OR SEXUALLY SUGGESTIVE
MESSAGES, EMOJIS AND IMAGES TO
PARTNER.
TYPE OF CYBERSEX

WEBCAM SEX
-TWO OR MORE PEOPLE OPEN UP
WEBCAMS AND ENGAGE WITH EACH OTHER
SEXUALLY USING COMMUNICATION TOOLS
SUCH AS FACETIME OR SKYPE.
TYPE OF CYBERSEX

PORNOGRAPHY AND EROTICA


-ONE WAY TO ENGAGE ID THROUGH
VIEWING OR READING EROTIC CONTENT ON
THE WEB.
TYPE OF CYBERSEX

TELEDILDONICS
-REFERS TO THE USE OF CONNECTED SEX
TOYS.
TYPE OF CYBERSEX
ALTERNATE REALITY AND VIRTUAL REALITY SEX
-VIRTUAL SEX ALSO ALLOWS PEOPLE THE
OPPORTUNITY TO EXPERIMENT WITH DIFFERENT
AVATARS, GENDERS AND FORMS OF SEXUALITY
THAT WOULDN’T BE POSSIBLE IN THE PHYSICAL
WORLD, SOMETHING THAT MANY CONSIDER TO
BE A BIG PLUS.
TYPES OF INTERNET ADDICTION
COMPULSIVE INFORMATION SEEKING

- IS CHARACTERIZED BY THE CONSTANT NEED TO


GATHER NEW INFORMATION IN TECHNOLOGICAL
CONTEXTS
TYPES OF INTERNET ADDICTION
NET COMPULSIONS

- THIS INVOLVES VIRTUAL ACTIVITIES THAT ARE


FINANCIALLY AND SOCIALLY DAMAGING.
TYPES OF INTERNET ADDICTION
COMPUTER OR GAMING ADDICTION

- THIS INVOLVES EXCESSIVE SCREEN TIME SPENT


PLAYING VIDEO GAMES.
TYPES OF INTERNET ADDICTION
CYBER RELATIONSHIP ADDICTION

- THIS IS THE COMPULSIVE NEED TO FIND AND


MAINTAIN ONLINE RELATIONSHIP.
DIGITAL DIVIDE

A TERM THAT REFERS TO THE GAP BETWEEN


DEMOGRAPHICS AND REGIONS THAT HAVE
ACCESS TO MODERN ICT AND THOSE THAT
DON’T OR HAVE RETRICTED ACCESS.

You might also like