q2 Mil Notes Compilation Min
q2 Mil Notes Compilation Min
1|Page
DOMAIN NAMES (URL) ✓ Skim the introduction and conclusion or if they are not
.com – commercial (blogsite) marked by headings, skim the first six or seven
. co – commercial paragraphs and the last four or five
.org – organization ✓ Skim the section for headings, read the first and last
.gov – government paragraph of those sections
.edu – education ✓ Check the bibliography for titles relevant to your topic
.ac – academic education
.net – network Evaluating Information Sources for Reliability
1. AUDIENCE
Commercial: to sell something (biased viewpoint)
- At what age group/ education/ political/ affiliation/etc. is
Organizations: can be anyone at all
the audience?
but if you recognize the name of the org (UNESCO and
- Is this person with in-depth knowledge or a layperson?
WORLD BANK) there is likely to have good-quality info
2. AUTHOR/AUTHORITY: defines who created the
Government: likely to be reliable, but is it “the truth”?, content, the individual or group’s credentials or
different gov likely to publish different viewpoints expertise, and provides contact information
Education: schools and universities - Do you know who published the source?
If a symbol is used after the main URL, then the information - Is the author’s name visible?
is from an individual within that educational organization, so - What are his/her credentials?
be a little more careful. - Can you find contact information?
- Is the source produced by a reputable organization?
Academic Education: usually only higher education.
3. BIAS
Ditto Education above - Is the source objective?
Network: usually a hub or internet provider - Could the writer or the organization’s affiliation put a
Blogsite: usually uncontrolled and unedited info different spin on the info presented?
but if you follow an author / academic / research, it could be - What is the purpose of the source?
excellent information in all cases 4. CURRENCY: Information is current and updated
frequently (if the links still work)
EVALUATING PRINT RESOURCES - Do you know when the information was originally
published and is the date acceptable?
Look for information in the book or journal: - Are web links current and reliable?
➢ Author information is usually on the back of the - Do charts and graphs have dates?
book, jacket cover, or near the contents page - How current is the topic?
➢ The foreword of the book often includes reference - If a web page, do the links work?
to the status or accomplishments of the authors 5. SCOPE: What does/doesn’t the work cover?
➢ The journal cover or start of a journal article usually - Is it an in-depth study (mane pages) or superficial (one
contains author information page)?
- Are the sources and statistics cited?
- If a site, dies it offer unique info not found in any other
Evaluating Information Sources for Relevance – Book
sources?
✓ Skim its index for keywords then the pages which
those occur
✓ Skim the first and last paragraphs in chapters that use EVALUATING INFORMATION
a lot of your key words - Eastern Kentucky University Libraries
✓ Skim introduction, summary, chapters, and so on ACCURACY: Content is grammatically correct, verifiable,
✓ Skim the last chapter especially the first and last two and cited when necessary
pages ➢ Are sources and references cited?
✓ If the source is a collection of articles, skim the editor’s ➢ Does the tone and style imply accuracy?
introduction ➢ Is information accurate and verifiable?
✓ Check the bibliography of titles relevant to your topic
FAIRNESS: Content is balanced, presenting all sides of an
Evaluating Information Sources for Relevance – Article issue and multiple points of view
✓ Read the abstract ➢ Is the source free of bias towards one point-of-
view?
2|Page
➢ Is the objectivity of the source consistent with its
purpose?
➢ Is the source free of advertising?
➢ Are various viewpoints presented?
RELEVANCE: Content is relevant to your topic or
research (purpose, intended audience)
➢ Does the purpose of the source meet your needs?
➢ Who is the intended audience? Will information
directed to them meet your needs?
➢ Is the information relevant to your research topic?
3|Page
MIL Q2 WK2
“Codes and Conventions & People Media”
MIL CONCEPTS CAMERA MOVEMENTS
PAN: Moving cam from left to right, or vice versa. Never
Media Audiences: How audiences are identified, pan more than your head can move from L-R
constructed, addressed, and reached; how audiences find, TILT: upwards and downwards, don’t tilt more than your
choose, consume, and respond to media texts. head can
TRACK: move cam physically from L-R, or vice-versa,
Media Technologies: What kinds of technologies are whilst remaining perpendicular / stable
available to whom, how to use them, the differences they
make to the production process as well as the final 2. Symbolism -is the art of hiding meaning behind
product. something apparently non-related
Media agencies / ownership: Who produces the text; Symbolic Codes – show what is beneath the
roles in production process, media institutions, economics surface of what we see (objects, setting, body
and ideologies, intentions and results. language, clothing, color, etc.)
*Music is both technical and symbolic!!
Media Languages: How the media produces meanings;
2 Major elements to a symbol
codes and conventions; narrative structure.
a. Content – what the symbol is representing
Media Categories: Different media (television, radio, b. Form – what the symbol itself is
cinema etc); forms (documentary, advertising etc); genres,
3. Written Codes - use of language style and textual
other ways of categorising text; how categorisation relates
layout (headlines, captions, speech bubbles, language
to understanding.
style, etc. )
Media Representation: The relation between media texts
and the actual places, people, events, ideas; stereotyping PEOPLE MEDIA
and its consequences.
Definition: Refers to the persons that are involved in the
GENRE : from the French word meaning ‘type’ or ‘class’ use of analysis, evaluation, and production of media and
- can be recognized by its common set of distinguishing information
features
People – medium of instruction and information
Codes – are systems of signs, which create meaning dissemination, primary tool of transferring knowledge and
Conventions – are the generally accepted ways of doing information. Information is being passed down from one
something person to another
1|Page
PEOPLE AS MEDIA ➢ They are the ones who utilize media such as cassette
tapes, CD’s, podcast and AM/FM radio broadcasting
➢ they are the media itself
in distributing local and international facts and
➢ The person serves as the medium
entertainments.
1. Opinion Leaders: highly exposed to and actively using
media C. TV Media
➢ source of viable interpretation of messages for lower- - Medium that uses the television to present information
end media users and has a wide audience reach
➢ opinions are accepted by a group
EDUCATIONAL IMPLICATION:
2. Citizen Journalism: People without professional a. Presents a fun and creative way of learning
journalism training can use the tools of modern technology through educational TV programs
and internet to create, augment or fact- check media on b. Children's Television Act of 1990 requires TV
their own or in collaboration with others. stations in the US to have minimum of 3 hours of
3. Social Journalist: Journalists are using social media to educational information program for children
make their content available to more people c. Short films, documentaries, in- depth studies
2|Page
Types of Journalists by Medium
1. Print Journalists
2. Photojournalists
3. Broadcast Journalists
4. Multimedia Journalists
ADVANTAGES
1. Flexible
2. Interactive
3. Ability to process feelings of IT media and Receivers
4. Ability to maintain relationships between sender and
receiver
5. Fast feedback
DISADVANTAGES
1. Reliability - capable of being relied on; dependable
2. Plagiarism – the practice of taking someone else’s work
or passing them off as one’s own ideas
3|Page
MIL Q2 Lesson 5
“Legal, Ethical, and Societal Issues”
2. PATENT – an exclusive right granted for an
Keep in mind these issues when using social media; thus
invention
ensure your research profile is raised for all the right
- provides the patent owner with the right to
reasons, not the wrong ones.
decide how – or whether – the invention can be
Key – remember that all laws, policies, and social rules used by others.
that apply in real life also apply on the interne t. - EX: Inventions, MJ’s defying gravity lean
3. TRADEMARK – a sign capable of distinguishing the
INTELLECTUAL PROPERTY goods or services of one enterprise from those of
other enterprises
➢ Refers to creations of the mind, such as - Trademark infringement:
inventions; literary and artistic works, designs,
symbols, names, and images used in commerce.
➢ It is protected in law (world intellectual property
organization and republic act 8293 intellectual
property code of the Philippines)
FAIR USE
Trademark Valid for 10 years and may be
renewed for a period of 10 years - means you can use copyrighted material without a
license only for certain purposes.
Invention patent Valid for 20 years from filing date • COMMENTARY
application
• CRITICISM
• REPORTING
• RESEARCH
• TEACHING
1|Page
GUIDELINES: REUSING WORK YOU HAVE ALREADY PUBLISHED
• A majority of the content you create must be
When a journal article or book is published, a contract is
your own.
signed with the publisher.
• Give credit to the copyright holder.
• Don’t make money off of the copyrighted work. ➢ This then controls what you can or can’t do with the
content from that time forward.
CREATIVE COMMONS ➢ A typical agreement will state what rights you retain
➢ is an American non-profit organization devoted to and which now belong to the publisher. If there is no
expanding the range of creative works available for detailed information in the agreement look for a
others to build upon legally and to share. the general policy on the publisher’s website or email the
organization has publisher’s rights and permissions section to ask.
➢ released several copyright-licenses known as TIP: keep on file a copy of the publishing agreements for
creative commons – licenses free of charge to the each of your publications for easy reference.
public.
CONTROLLING RE-USE OF YOUR WORK
WEBSITE: https://creativecommons.org/about/
Tell people what they can and can’t do with you work.
• Attribution: you must credit the creator Don’t leave to chance.
• Non-commercial: you can’t make a profit
• Nonderivative works: you can’t change the ➢ Make it a habit to display terms of conditions of use
content on any site where you post your intellectual property
• Share alike: you can change the content, but you (thoughts, photos, data, etc.).
have to let other people use your new work with
YOU CAN CONTROL THE RE-USE OF YOUR
the same license as the original
CONTENT BY:
• Selecting the appropriate sharing options offered by
social-media sites.
• Displaying a license.
• Writing your own simple terms and conditions of use.
Tip: for more official sharing of project information and
data, speak to the college’s contracts and intellectual
property team.
2|Page
TIP: if you aren’t sure ask your supervisor. Remember ➢ Don’t put anything online that might embarrass you
that you are trying to promote your work rather than tell later or cause another person embarrassment,
people so much that they won’t come to your conference commercial loss or distress.
presentation. Give people hints but not the whole story.
NETIQUETTE
TERMS AND CONDITIONS
network etiquette or internet etiquette is a set of social
• Make sure you read T&C so you know what the conventions that facilitate interaction over networks,
supplier can do with the content you add to their site ranging from Usenet and mailing lists to blogs and
and your personal data collected during registration. forums.
ETHICAL RESEARCH 5. Don’t steal those photographs off the web even
• Medical and scientific research is controlled by strict when they are a perfect fit for what you need.
codes of conduct. 6. Watch your language. No potty mouths.
• Defamation, harassment, and restrictions to free
7. Be patient with internet newbies. Know that they
speech.
are learning like you did once upon a time.
- Posting your words in public can be read by other. 8. No spamming. Spam is an unwanted electronic
This means that they can be judged as illegal, inaccurate, messages or sending the same electronic message
or offensive. over and over again. This can get you in a lot of
trouble on some sites.
TIP: if you become a website owner, to protect yourself,
you should display an agreed procedure for handling any 9. If you are using a header (such as in an email) make
complaints and monitor contributions to your site. It is a sure your content really pertains to the header.
common practice to remove any offending content while 10. Avoid overuse of emoticons.
the complaint is investigated.
DIGITAL DIVIDE
LOSS OF REPUTATION & IMPACT ON OTHERS
➢ Social media tools are very public; it is important that ➢ An economic and social inequality
you consider what you write and publish online might
Used to describe a gap between those who have ready
impact on your reputation and that of Imperial, your
access to information and communication technology and
funders, colleagues, family and people who take part
the skills to make use of those technologies and those
of your research.
who don’t have access or skills to use these same
technologies within an area, society or community
3|Page
Most commonly, a digital divide stems from poverty and HOW DO PEOPLE BECOME ADDICTED TO THE
the economic barriers that limit resources and prevent INTERNET?
people from obtaining or otherwise using newer To relieve unpleasant and overwhelming feelings.
technologies Many people turn to the Internet in order to manage
unpleasant feelings such as stress, loneliness, depression
CONCEPTUALIZATION OF THE DIGITAL DIVIDE and anxiety.
RISK FACTORS FOR INTERNET AND COMPUTER
➢ Subjects who have connectivity, or who connects:
ADDICTION
individuals, organizations, enterprises, schools,
hospitals, countries, etc. You are at greater risk of Internet addiction if:
➢ Characteristics of connectivity (e.g. income, - You suffer from anxiety
education, age, geographic location, etc.) - You are depressed
➢ Means of connectivity (e.g. fixed or mobile, Internet - You have any other addictions
or telephony, digital TV, etc.) - You lack social support
➢ Intensity of connectivity - You’re an unhappy teenager
➢ Purpose of connectivity - You are less mobile or socially active than you once
➢ Dynamics or evolution, whether the gap of concern were
will increase or decrease in the future, when the gap - You are stressed
of concern would be maximized
Internet addiction: Cybersex and Pornography
INTERNET AND COMPUTER ADDICTION It’s easy to spend hours on the Internet in the privacy of
your own home, and engage in fantasies impossible in real
Internet addiction, a.k.a. computer addiction, online life
addiction, or Internet Addiction Disorder (IAD), covers a Compulsively spending hours on the Internet viewing
variety of impulse-control problems, including: porn or engaging in other cybersex activities can
adversely affect real-life relationships, career, and
1. Cybersex addiction – compulsive use of Internet
emotional health
pornography, adult chat rooms or adult fantasy
role-play sites impacting negatively on real-life Internet addiction: Online Gambling
intimate relationships
- While gambling has been a well-documented problem
2. Cyber-Relationship Addiction – addiction to for years, the availability of Internet gambling has made it
chatting, texting, and social networking to the far more accessible
point where online friends become more - Online or virtual casinos are open 24/7 for anyone with
important than real-life relationships with family Internet access
and friends.
OTHER NET COMPULSIONS
3. Net compulsions – compulsive online gaming,
- Net compulsions such as compulsive stock trading or
gambling, stock trading, or compulsive use of
online auction shopping can just be as financially &
online auction sites such as eBay, often resulting
socially damaging as online gambling
in financial and job-related problems.
- Compulsive online gamers can isolate themselves for
4. Information overload – compulsive web surfing many hours at a time participating in virtual reality or
or database searching, leading to lower work online fantasy games, neglecting other aspects of their
productivity and less social interaction. lives such as work and family
5|Page
• Composing a piece of music that borrows heavily DIGITAL PIRACY: the practice of illegally copying and
from another composition. selling digital music, video, computer software, etc
IDENTITY THEFT: is the deliberate use of someone
Republic Act No. 10175
else's identity, usually as a method to gain a financial
Cybercrime Prevention Act of 2012
advantage or obtain credit and other benefits in the other
- is a law in the Philippines approved on September 12,
person's name, and perhaps to the other person's
2012 which aims to address legal issues concerning
disadvantage or loss
online interactions and the Internet.
CYBER DEFAMATION: is an unprivileged false
CYBERCRIME OFFENSES
statement of fact which tends to harm the reputation of a
person or company
CYBER: relating to, or involving computers or computer
networks (such as the Internet) TYPES OF DEFAMATION
CYBERCRIME: refers to the criminal activities carried • is a virtual sex encounter in which two or more people
out by means of computers or the Interne (connected remotely via internet) send each other
sexually explicit contents or sexually explicit acts
CYBERBULLYING: the use of electronic communication
to bully a person, typically by sending messages of an CHILD PORNOGRAPHY: child sexual exploitation
intimidating or threatening nature CYBERSQUATTING: is registering, trafficking in, or
HACKING: refers to the practice of modifying or altering using an Internet domain name with bad faith intent to
computer software and hardware to accomplish a goal profit from the goodwill of a trademark belonging to
that is considered to be outside of the creator's original someone else.
objective. CYBERSQUATTER: offers to sell the domain to the
PHISHING: is the attempt to obtain sensitive information person or company who owns a trademark contained
such as usernames, passwords, and credit card details within the name at an inflated price
(and, indirectly, money), often for malicious reasons, by COMPUTER ADDICTION: the excessive use of
disguising as a trustworthy entity in an electronic computers to the extent that it interferes with daily life.
communication. This excessive use may for example interfere with work
ILLEGAL DOWNLOADING: refers to obtaining files that or sleep, result in problems with social interaction, or
you do not have the right to use from the Internet. affect mood, relationships and thought processes.
6|Page