0% found this document useful (0 votes)
33 views

q2 Mil Notes Compilation Min

The document discusses different sources of information and how to evaluate them. It defines indigenous knowledge and media, describing their key characteristics. The document also outlines various types of information sources like books, journals, the internet and their advantages and disadvantages. It provides criteria for evaluating information sources for reliability, such as audience, author/authority, bias, currency and scope.

Uploaded by

lalla.lilli026
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views

q2 Mil Notes Compilation Min

The document discusses different sources of information and how to evaluate them. It defines indigenous knowledge and media, describing their key characteristics. The document also outlines various types of information sources like books, journals, the internet and their advantages and disadvantages. It provides criteria for evaluating information sources for reliability, such as audience, author/authority, bias, currency and scope.

Uploaded by

lalla.lilli026
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

MIL Q2 WK1

“Media and Information Sources”


Media and Information Sources - With the advent of accessibility to mainstream
media, they are more susceptible to external
A. Sources of Information influence
1. Indigenous Knowledge Minority Groups: Manobo, Mangyan, and Igorot
2. Library
3. Internet CHARACTERISTICS OF INDIGENOUS MEDIA
B. Pros and Cons of the Different Types of Media ➢ oral tradition of communication
as Sources of Information ➢ store information in memories
C. Evaluating Information Sources (Criteria) ➢ information exchange is face-to-face
➢ information are contained within the border of the
LOCAL KNOWLEDGE community
DAYAW: The Indigenous Peoples Fest (2013)
Definition: knowledge in a given community has
- resonates the richness of their culture
developed over time and continues to develop it.
Characteristics: TYPES OF SOURCES
➢ Based on experience
➢ Often tested over centuries of use Source Advantages Disadvantages
- difficult to rectify; practiced by communities Books - easy to access - quickly out of date
- “if it works for them, it works for you” - scope for - time consuming to
(argumentative) greater depth search/scan
➢ Adapted to local culture and environment of coverage - expensive to buy
➢ Embedded in community practices, institutions, than journal - storage problems
- overview - access to libraries
relationships, and rituals
- portable may be limited
➢ Held by individuals of communities (highly governed
- reduced cost - heavy
and manipulated by the elders)
if borrowed
➢ Dynamic and changing from library
In a minority group, leaders discourage members to go out Primary - more current - time-consuming to
of their community and learn. Because it’s hard to go back journals - may be search/scan
to the communal/local knowledge. And this is important available free - may not have
for traditional content online access to all titles
- peer-reviewed electronically
- easy to access - problems with peer
INDIGENOUS KNOWLEDGE
- portable revie
Definition: local knowledge – knowledge that is unique Internet - very up to date - No central
and inclusive to a given culture or society. - valuable/ directory; info and
➢ contrasts with the International knowledge system unique info sites are difficult to
generated by universities, research institutions, and - professional locate
private forms (Warren 1991) networking - No censorship or
- Universities: objective, procedural info exchange editing procedures
- IK: inclusive and contextual (adapt practices that - full-text - No quality
is applicable for them) - access to guarantee/validated
world-wide - Can be slow
INDIGENOUS MEDIA: owned, controlled, and managed
info - Needs comp and
by indigenous people in order for them
- 24 hr access ICT skills
- to develop and produce culturally appropriate
- Costs of getting
information in the languages understood by the addicted may result
community to time-wasting
- by utilizing indigenous materials and resources,
reflecting community needs and interests, visions
and aspirations, and independent from vested
interest groups

1|Page
DOMAIN NAMES (URL) ✓ Skim the introduction and conclusion or if they are not
.com – commercial (blogsite) marked by headings, skim the first six or seven
. co – commercial paragraphs and the last four or five
.org – organization ✓ Skim the section for headings, read the first and last
.gov – government paragraph of those sections
.edu – education ✓ Check the bibliography for titles relevant to your topic
.ac – academic education
.net – network Evaluating Information Sources for Reliability
1. AUDIENCE
Commercial: to sell something (biased viewpoint)
- At what age group/ education/ political/ affiliation/etc. is
Organizations: can be anyone at all
the audience?
but if you recognize the name of the org (UNESCO and
- Is this person with in-depth knowledge or a layperson?
WORLD BANK) there is likely to have good-quality info
2. AUTHOR/AUTHORITY: defines who created the
Government: likely to be reliable, but is it “the truth”?, content, the individual or group’s credentials or
different gov likely to publish different viewpoints expertise, and provides contact information
Education: schools and universities - Do you know who published the source?
If a symbol is used after the main URL, then the information - Is the author’s name visible?
is from an individual within that educational organization, so - What are his/her credentials?
be a little more careful. - Can you find contact information?
- Is the source produced by a reputable organization?
Academic Education: usually only higher education.
3. BIAS
Ditto Education above - Is the source objective?
Network: usually a hub or internet provider - Could the writer or the organization’s affiliation put a
Blogsite: usually uncontrolled and unedited info different spin on the info presented?
but if you follow an author / academic / research, it could be - What is the purpose of the source?
excellent information in all cases 4. CURRENCY: Information is current and updated
frequently (if the links still work)
EVALUATING PRINT RESOURCES - Do you know when the information was originally
published and is the date acceptable?
Look for information in the book or journal: - Are web links current and reliable?
➢ Author information is usually on the back of the - Do charts and graphs have dates?
book, jacket cover, or near the contents page - How current is the topic?
➢ The foreword of the book often includes reference - If a web page, do the links work?
to the status or accomplishments of the authors 5. SCOPE: What does/doesn’t the work cover?
➢ The journal cover or start of a journal article usually - Is it an in-depth study (mane pages) or superficial (one
contains author information page)?
- Are the sources and statistics cited?
- If a site, dies it offer unique info not found in any other
Evaluating Information Sources for Relevance – Book
sources?
✓ Skim its index for keywords then the pages which
those occur
✓ Skim the first and last paragraphs in chapters that use EVALUATING INFORMATION
a lot of your key words - Eastern Kentucky University Libraries
✓ Skim introduction, summary, chapters, and so on ACCURACY: Content is grammatically correct, verifiable,
✓ Skim the last chapter especially the first and last two and cited when necessary
pages ➢ Are sources and references cited?
✓ If the source is a collection of articles, skim the editor’s ➢ Does the tone and style imply accuracy?
introduction ➢ Is information accurate and verifiable?
✓ Check the bibliography of titles relevant to your topic
FAIRNESS: Content is balanced, presenting all sides of an
Evaluating Information Sources for Relevance – Article issue and multiple points of view
✓ Read the abstract ➢ Is the source free of bias towards one point-of-
view?

2|Page
➢ Is the objectivity of the source consistent with its
purpose?
➢ Is the source free of advertising?
➢ Are various viewpoints presented?
RELEVANCE: Content is relevant to your topic or
research (purpose, intended audience)
➢ Does the purpose of the source meet your needs?
➢ Who is the intended audience? Will information
directed to them meet your needs?
➢ Is the information relevant to your research topic?

SELECTION CRITERIA CHECKLIST

Reading newspaper article: Facebook tags several fake


news items

HOW TO SPOT FAKE NEWS:

3|Page
MIL Q2 WK2
“Codes and Conventions & People Media”
MIL CONCEPTS CAMERA MOVEMENTS
PAN: Moving cam from left to right, or vice versa. Never
Media Audiences: How audiences are identified, pan more than your head can move from L-R
constructed, addressed, and reached; how audiences find, TILT: upwards and downwards, don’t tilt more than your
choose, consume, and respond to media texts. head can
TRACK: move cam physically from L-R, or vice-versa,
Media Technologies: What kinds of technologies are whilst remaining perpendicular / stable
available to whom, how to use them, the differences they
make to the production process as well as the final 2. Symbolism -is the art of hiding meaning behind
product. something apparently non-related

Media agencies / ownership: Who produces the text; Symbolic Codes – show what is beneath the
roles in production process, media institutions, economics surface of what we see (objects, setting, body
and ideologies, intentions and results. language, clothing, color, etc.)
*Music is both technical and symbolic!!
Media Languages: How the media produces meanings;
2 Major elements to a symbol
codes and conventions; narrative structure.
a. Content – what the symbol is representing
Media Categories: Different media (television, radio, b. Form – what the symbol itself is
cinema etc); forms (documentary, advertising etc); genres,
3. Written Codes - use of language style and textual
other ways of categorising text; how categorisation relates
layout (headlines, captions, speech bubbles, language
to understanding.
style, etc. )
Media Representation: The relation between media texts
and the actual places, people, events, ideas; stereotyping PEOPLE MEDIA
and its consequences.
Definition: Refers to the persons that are involved in the
GENRE : from the French word meaning ‘type’ or ‘class’ use of analysis, evaluation, and production of media and
- can be recognized by its common set of distinguishing information
features
People – medium of instruction and information
Codes – are systems of signs, which create meaning dissemination, primary tool of transferring knowledge and
Conventions – are the generally accepted ways of doing information. Information is being passed down from one
something person to another

Characteristics of People Media


TYPES OF CODES
a. Articulate – expressing oneself in a clear and effective
language
1. Technical Code - ways in which equipment is used to
tell the story (camera techniques, framing, depth of fields, b. Charismatic – appeals to the sense of different people
lighting, and exposure, etc.)
c. Creative – imagination or original ideas especially in
Basic Camera Advanced Camera Angles the production of artistic work
Shots Camera Shots
Extreme Wide Shot -Two Shot - Eye-Level d. Credible – able to be believed
Wide Shot -Cut Away - High Angle
Medium Shot -Over the - Low Angle e. Flexible – knows how to use a range of technology
Medium Close- up Shoulder - Bird's Eye View
Close- up -Point of View - Worm’s Eye View
f. Interactive – allowing a two-way flow of information
Extreme Close- up -Selective Focus - Slanted (canted)
g. Tech Savvy – proficient in the use of technology
-Arc Shot
h. Updated – knows latest information

1|Page
PEOPLE AS MEDIA ➢ They are the ones who utilize media such as cassette
tapes, CD’s, podcast and AM/FM radio broadcasting
➢ they are the media itself
in distributing local and international facts and
➢ The person serves as the medium
entertainments.
1. Opinion Leaders: highly exposed to and actively using
media C. TV Media
➢ source of viable interpretation of messages for lower- - Medium that uses the television to present information
end media users and has a wide audience reach
➢ opinions are accepted by a group
EDUCATIONAL IMPLICATION:
2. Citizen Journalism: People without professional a. Presents a fun and creative way of learning
journalism training can use the tools of modern technology through educational TV programs
and internet to create, augment or fact- check media on b. Children's Television Act of 1990 requires TV
their own or in collaboration with others. stations in the US to have minimum of 3 hours of
3. Social Journalist: Journalists are using social media to educational information program for children
make their content available to more people c. Short films, documentaries, in- depth studies

4. Crowdsourcing: The practice of obtaining needed People in TV Media


services, ideas, or content by soliciting contributions from News anchors, reporters, hosts, actors, script writers,
a large group of people and especially from the online video jock
community ➢ They are personalities on TV as well as people working
PEOPLE IN MEDIA behind the camera.

➢ the people behind another form of media


They use other forms of media such as text media, visual D. Web Media
media, multimedia, etc. in disseminating information and - Uses internet or World Wide Web as means of
imparting knowledge. information exchange and uses audio and visual
functionality
A. Print Media
EDUCATIONAL IMPLICATON:
- Uses any printed material
a. internet is a major source of research materials
- Primary aid/tool in the classroom
b. free online courses
- Publishers of education materials are experts in their field
c. online educational programs
- Good source of current news and events
d. outlet for group meetings and discussion
- Outlet of expressing oneself (written or visual art)
People behind print media: authors, publishers, editors, People in Web Media
columnists, visual artists, and photographers. Bloggers, online media, web administrator, users, and web
➢ They are the ones who utilizes texts visual arts in writers
order to impart knowledge, transfer information ➢ Medium is the internet or the world wide web as a
and express opinions using printed materials. means of information exchange.

B. Radio Media E. Instructional Media


- Radio is a powerful mass medium of communication - Medium that uses instructional materials and resources
- Dissemination of information, imparting instruction, and to impart knowledge, skills and attitude through
giving entertainment educational or technical coursed
- Can be used over a large area by means of producing data
that is transmitted through radio waves People in Instructional Media
Professors, instructors, speakers, coaches, and trainers
People in Radio Media - They are the main source of information in a classroom-
Radio DJs, broadcasters, commentators, radio actors, and like environment.
song artist

2|Page
Types of Journalists by Medium

1. Print Journalists
2. Photojournalists
3. Broadcast Journalists
4. Multimedia Journalists

ADVANTAGES
1. Flexible
2. Interactive
3. Ability to process feelings of IT media and Receivers
4. Ability to maintain relationships between sender and
receiver
5. Fast feedback

DISADVANTAGES
1. Reliability - capable of being relied on; dependable
2. Plagiarism – the practice of taking someone else’s work
or passing them off as one’s own ideas

3|Page
MIL Q2 Lesson 5
“Legal, Ethical, and Societal Issues”
2. PATENT – an exclusive right granted for an
Keep in mind these issues when using social media; thus
invention
ensure your research profile is raised for all the right
- provides the patent owner with the right to
reasons, not the wrong ones.
decide how – or whether – the invention can be
Key – remember that all laws, policies, and social rules used by others.
that apply in real life also apply on the interne t. - EX: Inventions, MJ’s defying gravity lean
3. TRADEMARK – a sign capable of distinguishing the
INTELLECTUAL PROPERTY goods or services of one enterprise from those of
other enterprises
➢ Refers to creations of the mind, such as - Trademark infringement:
inventions; literary and artistic works, designs,
symbols, names, and images used in commerce.
➢ It is protected in law (world intellectual property
organization and republic act 8293 intellectual
property code of the Philippines)

TYPES OF INTELLECTUAL PROPERTY


4. INDUSTRIAL DESIGN – constitutes the ornamental
1. COPYRIGHT – a legal term used to describe the or aesthetic aspect of an article
rights that creators have over their literary and - may consist of three-dimensional features (shape
artistic works (books, music, paintings, sculpture and or surface of an article) or of two-dimensional
films, computer programs, databases, ads, maps, and features (patterns, lines, or color)
technical drawings).

REPUBLIC ACT 8293 INTELLECTUAL PROPERTY


CODE OF THE PHILIPPINES

COPYRIGHT VALIDITY PERIOD

Literary works During the lifetime of the author


plus 50 years after death
Art 25 years from date of creation
-
5. INDICATIONS AND APPELLATIONS OF ORIGIN
Photographic work 50 years fro publication
– signs used on goods that have specific
Audio-visual work 50 years from publication geographical origin and possess qualities, a
reputation or characteristics that are essentially
Sound recording 50 years from year recording took
attributable to that place of origin
place
- most commonly includes the name of the place of
Broadcast recording 20 years from date of broadcast
origin of the goods

FAIR USE
Trademark Valid for 10 years and may be
renewed for a period of 10 years - means you can use copyrighted material without a
license only for certain purposes.
Invention patent Valid for 20 years from filing date • COMMENTARY
application
• CRITICISM
• REPORTING
• RESEARCH
• TEACHING

1|Page
GUIDELINES: REUSING WORK YOU HAVE ALREADY PUBLISHED
• A majority of the content you create must be
When a journal article or book is published, a contract is
your own.
signed with the publisher.
• Give credit to the copyright holder.
• Don’t make money off of the copyrighted work. ➢ This then controls what you can or can’t do with the
content from that time forward.
CREATIVE COMMONS ➢ A typical agreement will state what rights you retain
➢ is an American non-profit organization devoted to and which now belong to the publisher. If there is no
expanding the range of creative works available for detailed information in the agreement look for a
others to build upon legally and to share. the general policy on the publisher’s website or email the
organization has publisher’s rights and permissions section to ask.
➢ released several copyright-licenses known as TIP: keep on file a copy of the publishing agreements for
creative commons – licenses free of charge to the each of your publications for easy reference.
public.
CONTROLLING RE-USE OF YOUR WORK
WEBSITE: https://creativecommons.org/about/
Tell people what they can and can’t do with you work.
• Attribution: you must credit the creator Don’t leave to chance.
• Non-commercial: you can’t make a profit
• Nonderivative works: you can’t change the ➢ Make it a habit to display terms of conditions of use
content on any site where you post your intellectual property
• Share alike: you can change the content, but you (thoughts, photos, data, etc.).
have to let other people use your new work with
YOU CAN CONTROL THE RE-USE OF YOUR
the same license as the original
CONTENT BY:
• Selecting the appropriate sharing options offered by
social-media sites.
• Displaying a license.
• Writing your own simple terms and conditions of use.
Tip: for more official sharing of project information and
data, speak to the college’s contracts and intellectual
property team.

POSTING NEW UNPUBLISHED WORK

The college’s IP policy explains when copyright belongs


to you as a student and when it may belong to Imperial or
the organization funding your research.
REUSING OTHER PEOPLE’S WORK
Before sharing your work on a social media site might
• Material on the internet is protected by copyright. check that it won’t:
You have no legal right to copy other people’s work 1. Damage a patent application
or make it public on the internet. 2. Stop you or your supervisor publishing the work
• Remember: multi-media works will have multiple later
copyright owners. 3. Infringe someone else’s rights
4. Highlight that animal research is done in your lab
• TIPS: link to other’s people’s work instead of copying
5. Break a prior confidentially agreement
it. Look for terms of use and rights information on
6. Pose a risk to national security
blogs, websites, and photo sharing services.

2|Page
TIP: if you aren’t sure ask your supervisor. Remember ➢ Don’t put anything online that might embarrass you
that you are trying to promote your work rather than tell later or cause another person embarrassment,
people so much that they won’t come to your conference commercial loss or distress.
presentation. Give people hints but not the whole story.
NETIQUETTE
TERMS AND CONDITIONS
network etiquette or internet etiquette is a set of social
• Make sure you read T&C so you know what the conventions that facilitate interaction over networks,
supplier can do with the content you add to their site ranging from Usenet and mailing lists to blogs and
and your personal data collected during registration. forums.

PERSONAL DATA 10 RULES OF NETIQUTTE


Data protection laws protect personal data (data
1. When typing never write in all capital letters. That is
retaining to an identifiable individual) and prevent it being
shouting.
released to the general public.
➢ You should therefore not make personal data public 2. Don’t plagiarize. Give the owner a credit. Site their
via social media tools or use social media tools to name and also the site.
share personal information with collaborators. 3. Use proper quotes and always use the whole quote.
Don’t take quotes out of context and don’t be
COLLEGE DATA PROTECTION PAGES
selective about which part of the quote you want to
➢ TIP: be careful about the personal data you share on use.
facebook and other social networking sites. You don’t 4. Don’t gossip and keep personal information
want someone you’ve never met texting you or ringing personal. Don’t tell stories that you don’t know for a
your front door bell. fact to be true.

ETHICAL RESEARCH 5. Don’t steal those photographs off the web even
• Medical and scientific research is controlled by strict when they are a perfect fit for what you need.
codes of conduct. 6. Watch your language. No potty mouths.
• Defamation, harassment, and restrictions to free
7. Be patient with internet newbies. Know that they
speech.
are learning like you did once upon a time.
- Posting your words in public can be read by other. 8. No spamming. Spam is an unwanted electronic
This means that they can be judged as illegal, inaccurate, messages or sending the same electronic message
or offensive. over and over again. This can get you in a lot of
trouble on some sites.
TIP: if you become a website owner, to protect yourself,
you should display an agreed procedure for handling any 9. If you are using a header (such as in an email) make
complaints and monitor contributions to your site. It is a sure your content really pertains to the header.
common practice to remove any offending content while 10. Avoid overuse of emoticons.
the complaint is investigated.
DIGITAL DIVIDE
LOSS OF REPUTATION & IMPACT ON OTHERS

➢ Social media tools are very public; it is important that ➢ An economic and social inequality
you consider what you write and publish online might
Used to describe a gap between those who have ready
impact on your reputation and that of Imperial, your
access to information and communication technology and
funders, colleagues, family and people who take part
the skills to make use of those technologies and those
of your research.
who don’t have access or skills to use these same
technologies within an area, society or community

3|Page
Most commonly, a digital divide stems from poverty and HOW DO PEOPLE BECOME ADDICTED TO THE
the economic barriers that limit resources and prevent INTERNET?
people from obtaining or otherwise using newer To relieve unpleasant and overwhelming feelings.
technologies Many people turn to the Internet in order to manage
unpleasant feelings such as stress, loneliness, depression
CONCEPTUALIZATION OF THE DIGITAL DIVIDE and anxiety.
RISK FACTORS FOR INTERNET AND COMPUTER
➢ Subjects who have connectivity, or who connects:
ADDICTION
individuals, organizations, enterprises, schools,
hospitals, countries, etc. You are at greater risk of Internet addiction if:
➢ Characteristics of connectivity (e.g. income, - You suffer from anxiety
education, age, geographic location, etc.) - You are depressed
➢ Means of connectivity (e.g. fixed or mobile, Internet - You have any other addictions
or telephony, digital TV, etc.) - You lack social support
➢ Intensity of connectivity - You’re an unhappy teenager
➢ Purpose of connectivity - You are less mobile or socially active than you once
➢ Dynamics or evolution, whether the gap of concern were
will increase or decrease in the future, when the gap - You are stressed
of concern would be maximized
Internet addiction: Cybersex and Pornography
INTERNET AND COMPUTER ADDICTION It’s easy to spend hours on the Internet in the privacy of
your own home, and engage in fantasies impossible in real
Internet addiction, a.k.a. computer addiction, online life
addiction, or Internet Addiction Disorder (IAD), covers a Compulsively spending hours on the Internet viewing
variety of impulse-control problems, including: porn or engaging in other cybersex activities can
adversely affect real-life relationships, career, and
1. Cybersex addiction – compulsive use of Internet
emotional health
pornography, adult chat rooms or adult fantasy
role-play sites impacting negatively on real-life Internet addiction: Online Gambling
intimate relationships
- While gambling has been a well-documented problem
2. Cyber-Relationship Addiction – addiction to for years, the availability of Internet gambling has made it
chatting, texting, and social networking to the far more accessible
point where online friends become more - Online or virtual casinos are open 24/7 for anyone with
important than real-life relationships with family Internet access
and friends.
OTHER NET COMPULSIONS
3. Net compulsions – compulsive online gaming,
- Net compulsions such as compulsive stock trading or
gambling, stock trading, or compulsive use of
online auction shopping can just be as financially &
online auction sites such as eBay, often resulting
socially damaging as online gambling
in financial and job-related problems.
- Compulsive online gamers can isolate themselves for
4. Information overload – compulsive web surfing many hours at a time participating in virtual reality or
or database searching, leading to lower work online fantasy games, neglecting other aspects of their
productivity and less social interaction. lives such as work and family

5. Computer addiction – obsessive playing of INTERNET ADDICTION: CYBER-RELATIONSHIPS


offline games such as Solitaire or Minesweeper, - Online relationships can often be more intense than
or obsessive computer programming those in real life
*The most common are cybersex, online gambling and - Our fantasies are given free reign and the idea of being
cyber-relationship addiction. with our online love can exceed all realistic expectations
4|Page
- Another problem is that about 50% of people online lie 2. THE PHOTOCOPY
about their age, weight, job, marital status or gender. The writer copies significant portions of text straight
from a single source, without alteration
- When online friends meet and the real-life person fails
3. THE POTLUCK PAPER
to match the online persona, it can create profound
The writer copies from several different sources,
emotional disappointment
tweaking the sentences to make them fit together
DIGITAL CITIZENSHIP, NETIQUETTE, DIGITAL while retaining most of the original phrasing.
FOOTPRINTS, AND DIGITAL ISSUES 4. THE POOR DISGUISE
The writer has altered the paper’s appearance slightly
DIGITAL CITIZENSHIP by changing keywords and phrases.
5. THE LABOR OF LAZINESS
➢ the norms of appropriate, responsible technology use The writer takes the time to paraphrase most of the
➢ a holistic and positive approach to helping children paper from other sources and make it all fit together.
learn how to be safe and secure, as well as smart and 6. THE SELF-STEALER
effective participants in a digital world The writer “borrows” generously from his or her
previous work.
NETIQUETTE 7. THE FORGOTTEN FOOTNOTE
➢ set of rules for behaving properly online ( The Core (SOURCES CITED. BUT STILL PLAGIARIZED)
Rules of Netiquette by Virginia Shea ) respecting The writer mentions an author’s name for a source, but
other users’ views and displaying common courtesy neglects to include specific information on the location of
when posting your views to online discussion groups the material referenced
8. THE MISINFORMER
THE CORE RULES OF NETIQUETTE The writer provides inaccurate information regarding
the sources, making it impossible to find them.
• RULE 1: REMEMBER THE HUMAN 9. THE TOO-PERFECT PARAPHRASE
• RULE 2: ADHERE TO THE SAME STANDARDS OF The writer properly cites a source, but neglects to put
BEHAVIOR ONLINE THAT YOU FOLLOW IN REAL in quotation marks on text that has been copied
LIFE word-for-word, or close to it.
• RULE 3: KNOW WHERE YOU ARE IN 10. THE RESOURCEFUL CITER
CYBERSPACE The writer properly cites all sources, paraphrasing
• RULE 4: RESPECT OTHER PEOPLE'S TIME AND and using quotations appropriately. The catch? The
BANDWIDTH paper contains almost no original work!
• RULE 5: MAKE YOURSELF LOOK GOOD ONLINE 11. THE PERFECT CRIME
• RULE 6: SHARE EXPERT KNOWLEDGE The writer properly quotes and cites sources in some
• RULE 7: HELP KEEP FLAME WARS UNDER places, but goes on to paraphrase other arguments
CONTROL from those sources without citation.
• RULE 8: RESPECT OTHER PEOPLE'S PRIVACY
P. IN IMAGES, VIDEOS, AND MUSIC
• RULE 9: DON'T ABUSE YOUR POWER
• RULE 10: BE FORGIVING OF OTHER PEOPLE'S Without receiving proper permission or providing
MISTAKES appropriate citation, the following are considered
SHEA, V. (1994). CORE RULES OF NETIQUETTE. NETIQUETTE plagiarism:
(ONLINE ED., PP. 32-45). SAN FRANCISCO: ALBION BOOKS. • Copying media (especially images) from other
websites to paste them into your own papers or
PLAGIARISM websites.
• Making a video using footage from others’ videos
TYPES OF PLAGIARSIM or using copyrighted music as part of the
1. GHOST WRITER (sources not cited) soundtrack.
The writer turns in another’s work, word-for-word, as • Performing another person’s copyrighted music
his or her own. (i.e., playing a cover).

5|Page
• Composing a piece of music that borrows heavily DIGITAL PIRACY: the practice of illegally copying and
from another composition. selling digital music, video, computer software, etc
IDENTITY THEFT: is the deliberate use of someone
Republic Act No. 10175
else's identity, usually as a method to gain a financial
Cybercrime Prevention Act of 2012
advantage or obtain credit and other benefits in the other
- is a law in the Philippines approved on September 12,
person's name, and perhaps to the other person's
2012 which aims to address legal issues concerning
disadvantage or loss
online interactions and the Internet.
CYBER DEFAMATION: is an unprivileged false
CYBERCRIME OFFENSES
statement of fact which tends to harm the reputation of a
person or company
CYBER: relating to, or involving computers or computer
networks (such as the Internet) TYPES OF DEFAMATION

CYBERSPACE: refers to the virtual computer world, and 1. LIBEL – WRITTEN


more specifically, is an electronic medium used to form a 2. SLANDER – VEBRAL
global computer network to facilitate online
communication CYBERSEX: called computer sex, Internet sex, netsex

CYBERCRIME: refers to the criminal activities carried • is a virtual sex encounter in which two or more people
out by means of computers or the Interne (connected remotely via internet) send each other
sexually explicit contents or sexually explicit acts
CYBERBULLYING: the use of electronic communication
to bully a person, typically by sending messages of an CHILD PORNOGRAPHY: child sexual exploitation
intimidating or threatening nature CYBERSQUATTING: is registering, trafficking in, or
HACKING: refers to the practice of modifying or altering using an Internet domain name with bad faith intent to
computer software and hardware to accomplish a goal profit from the goodwill of a trademark belonging to
that is considered to be outside of the creator's original someone else.
objective. CYBERSQUATTER: offers to sell the domain to the
PHISHING: is the attempt to obtain sensitive information person or company who owns a trademark contained
such as usernames, passwords, and credit card details within the name at an inflated price
(and, indirectly, money), often for malicious reasons, by COMPUTER ADDICTION: the excessive use of
disguising as a trustworthy entity in an electronic computers to the extent that it interferes with daily life.
communication. This excessive use may for example interfere with work
ILLEGAL DOWNLOADING: refers to obtaining files that or sleep, result in problems with social interaction, or
you do not have the right to use from the Internet. affect mood, relationships and thought processes.

ILLEGAL DOWNLOADING LEGAL DIGITAL DIVIDE: an economic inequality between


SITES DOWNLOADING groups in terms of access to, use of, or knowledge of ICT.
SITES
The divide within countries can refer to inequalities
THE PIRATE BAY ITUNES between individuals, households, businesses, and
KICKASS.TO YAHOO MUSIC geographic areas at different socioeconomic (and other
demographic) levels
TORRENTDOWNLOADS.ME AMAZON
VIRTUAL SELF: The persona you create about yourself
YTS.AG NETFLIX
virtually
RARBG.TO RUCKUS

6|Page

You might also like