00:00:00
[Music]
00:00:18
good day everyone welcome back to media
00:00:20
and information literacy for our sixth
00:00:23
lesson we will be discussing the
00:00:24
different legal ethical and societal
00:00:27
issues in media and information literacy
00:00:30
for today we will be covering a variety
00:00:32
of different topics that are related to
00:00:34
digital citizenship the different issues
00:00:37
in media and information literacy such
00:00:39
as intellectual property and plagiarism
00:00:42
data privacy other forms of cyber crimes
00:00:45
cyber bullying fake information or what
00:00:48
we refer to as fake news
00:00:50
we will also be discussing computer
00:00:52
addiction and digital divide towards the
00:00:55
end of our lesson you will also be
00:00:57
talking about netiquette there is no
00:00:59
doubt that the world that we are living
00:01:01
in right now is highly advanced in terms
00:01:03
of technology which has of course been
00:01:07
ingrained into our daily lives for
00:01:09
example you have your cell phones your
00:01:12
smartphones that they use to communicate
00:01:15
talk to people before robots are only
00:01:18
part of science fiction but right now we
00:01:20
are living in a society that actually
00:01:22
has a lot of robots that not only can we
00:01:25
use in terms of industry production but
00:01:28
also robots that we could interact with
00:01:30
similarly the concepts of augmented
00:01:32
reality and virtual reality have already
00:01:35
been a great part of our discussion when
00:01:38
it comes to technology and advancements
00:01:41
aside from that all the information that
00:01:43
you might need even those that you are
00:01:46
not looking for could easily be accessed
00:01:48
with a touch of your finger or a click
00:01:51
of a button because of all of these
00:01:53
technological advancements a lot of the
00:01:56
things that we used to do have become so
00:01:59
much easier to accomplish especially in
00:02:02
terms of communication as well as
00:02:05
forming and establishing connections
00:02:08
with other people regardless whether
00:02:10
they are close to you in terms of
00:02:12
geography or not if you have seen the
00:02:15
movie spider-man then you probably would
00:02:18
know about this quote according to uncle
00:02:20
ben who was one of the characters in the
00:02:22
franchise he said that the great power
00:02:25
comes great responsibility and with
00:02:27
advancements that we have right now in
00:02:30
our society in terms of technology we
00:02:33
have harnessed so much power we could do
00:02:36
so much because of it but one thing that
00:02:39
you have to remember is that since you
00:02:41
are holding so much power in your hand
00:02:44
so much potential in your hand you also
00:02:46
need to be responsible and accountable
00:02:49
for what you do and how you use that
00:02:52
power and that is basically what we're
00:02:54
gonna talk about for today's lesson let
00:02:56
us begin our discussion with unpacking
00:02:59
the term digital citizenship digital
00:03:02
citizenship according to unesco in 2016
00:03:06
is simply your ability to find access
00:03:09
use and create information effectively
00:03:12
it is also described as your ability to
00:03:14
engage with other users and with content
00:03:17
in an active critical sensitive and
00:03:20
ethical manner as well as navigating the
00:03:23
online and ict environment safely and
00:03:26
responsibly with you being aware of your
00:03:30
own rights as users simply put digital
00:03:34
citizenship refers to our responsible
00:03:38
use of technology and all the
00:03:41
advancements that it has brought upon us
00:03:44
especially in this digital world digital
00:03:47
citizenship also entails you knowing
00:03:50
about the different issues in media and
00:03:52
information literacy because if you are
00:03:55
aware of all of these issues all of
00:03:58
these potential problems then it would
00:04:00
be easier for you to engage to
00:04:03
participate in the discussion of
00:04:06
responsible digital use let us take this
00:04:09
one for example have you ever
00:04:11
experienced having to come up with a
00:04:14
very novel idea or a very good idea but
00:04:18
then eventually
00:04:19
someone else stole it from you that
00:04:23
actually could already be an
00:04:25
infringement of your intellectual
00:04:27
property rights but what exactly is
00:04:30
intellectual property intellectual
00:04:32
property according to the world
00:04:34
intellectual property organization in
00:04:36
2016
00:04:38
simply refers to the creations of the
00:04:41
mind such as inventions literary and
00:04:45
artistic works designs symbols names and
00:04:49
images used in commerce so it is simply
00:04:53
a novel idea something that is new
00:04:56
something that hasn't been done before
00:04:58
that could be attributed to a specific
00:05:01
person there are also different types of
00:05:03
intellectual property the first one is
00:05:06
copyright next is the patent third is
00:05:09
the trademark next one is industrial
00:05:11
design and the last one is what we refer
00:05:14
to as geographical indications and
00:05:16
appellations of origin let us define all
00:05:19
of these types one by one copyright is a
00:05:22
legal term that is used to describe the
00:05:25
rights that creators have over their
00:05:28
literary and artistic works and often it
00:05:31
gives the creator the sole right to
00:05:34
publish and sell that work having filed
00:05:37
for a copyright therefore gives that
00:05:40
specific person especially the creator
00:05:43
of that particular literary or artistic
00:05:46
work the right to distribute his or her
00:05:50
own work meaning no other person could
00:05:53
use that particular literary or artistic
00:05:57
work without the permission of the
00:06:00
copyright owner especially if they
00:06:02
intend to make money out of using that
00:06:05
particular work of art or work of
00:06:08
literature filing for a copyright is
00:06:11
very important because it protects the
00:06:13
form of material expression and is only
00:06:16
available for works that are fixed
00:06:19
tangible form meaning it has to be
00:06:21
something that could be touched it could
00:06:24
be felt by the hand however it is very
00:06:27
important to remember that filing for a
00:06:29
copyright is not always mandatory but it
00:06:32
is recommended when someone violates
00:06:35
this particular intellectual property
00:06:38
right then it is called an infringement
00:06:41
here are some of the famous copyright
00:06:43
infringement claims in the world so for
00:06:46
example league of legends actually filed
00:06:49
for a copyright infringement claim
00:06:51
against the creators of mobile legends
00:06:54
because the creators of league of
00:06:57
legends said that many of the aspects
00:07:00
and features of mobile legends were
00:07:03
actually derived from the
00:07:06
game league of legends another very
00:07:09
famous copyright infringement claim is
00:07:12
that of freddie mercury and david bowie
00:07:14
versus the creator of the song ice ice
00:07:17
baby because
00:07:19
they claim that some of the beats in the
00:07:22
song are similar to the beats of the
00:07:24
other another copyright infringement
00:07:26
claim is this particular picture of
00:07:29
barack obama so this was taken by a
00:07:30
photographer and it became very very
00:07:33
popular throughout the internet and then
00:07:35
a modern artist actually used this
00:07:37
photograph to create his or her own work
00:07:41
of art here in the philippines one very
00:07:43
famous copyright infringement claim is
00:07:45
that of huawei vs willing wheelie the
00:07:48
shows okay so according to the producers
00:07:52
and the creators of huawei willingwilly
00:07:55
actually has the same format same
00:07:57
concept as that of the original show
00:08:00
part of the discussion of copyright and
00:08:02
copyright infringement claims is the
00:08:05
term plagiarism i know that as students
00:08:07
you are very much familiar with what
00:08:10
this term is all about plagiarism is
00:08:13
simply defined as an act or an instance
00:08:16
of using or closely imitating the
00:08:18
language and thoughts of another author
00:08:22
without authorization meaning without
00:08:25
consent from that author it could also
00:08:27
be the representation of that particular
00:08:30
author's work as one's own meaning you
00:08:33
are claiming it as your own as by not
00:08:36
crediting the original author so failure
00:08:40
to give credit where credit is ju is
00:08:43
actually an act of plagiarism here are
00:08:46
some examples of common acts of
00:08:48
plagiarism some of you might think that
00:08:51
these are simple and could easily be
00:08:53
dismissed but actually it's not remember
00:08:56
that plagiarism is an act of crime
00:08:59
remember that it is an app of cheating
00:09:02
and stealing first copying media
00:09:04
especially images from other websites to
00:09:07
paste them into your own papers or
00:09:09
websites is already an act of plagiarism
00:09:12
especially if you are not giving credit
00:09:15
to who it belong to another example is
00:09:18
making a video using footage from others
00:09:21
videos or using copyrighted music as
00:09:24
part of your own soundtrack that could
00:09:26
also be an act of plagiarism performing
00:09:29
another person's copyrighted music for
00:09:32
example you are playing a cover and then
00:09:35
claiming it as if it's your own song
00:09:37
then that could be an act of pleasure
00:09:39
you're saying composing a piece of music
00:09:41
that borrows heavily from another
00:09:44
composition is also an act of teachers
00:09:47
and many of you are probably wondering
00:09:49
what if that particular piece of media
00:09:52
is already available on the internet as
00:09:55
a resource then that is where
00:09:58
the next concept is gonna come in and
00:10:01
that is the concept of fair use we have
00:10:05
this thing called fair use so that you
00:10:07
don't always get to be accused of
00:10:09
stealing someone else's work or
00:10:11
plagiarizing someone else's work so what
00:10:14
is fair use it is basically a legal
00:10:17
principle in which one can use a
00:10:20
copyrighted work without a license for
00:10:22
the following purposes number one for
00:10:25
commentary
00:10:26
for criticism of that particular word
00:10:30
for reporting about that particular work
00:10:33
research you could include it and of
00:10:35
course for teaching purposes just like
00:10:38
what i am doing right now so many of the
00:10:40
images that i have been using for my
00:10:43
lectures are lifted from the internet
00:10:46
because that's the only source that i
00:10:48
could get them from however since i'm
00:10:50
using it to teach my students i am still
00:10:53
under the clause of fair use but if i am
00:10:57
making money out of it for example i am
00:11:01
selling all of these materials and
00:11:03
making money out of it then that could
00:11:06
be already grounds for copyright
00:11:09
infringement claims there is also what
00:11:12
we refer to as the spectrum of right so
00:11:15
it begins of course with copyrights
00:11:17
wherein the use or reuse of that
00:11:20
particular media or medium requires the
00:11:23
permission from the copyright owner
00:11:25
there is also this thing called creative
00:11:28
commons which i guess you have all
00:11:30
encountered wherein wherein some rights
00:11:33
of the owner are reserved reuse is
00:11:36
permitted without permission under
00:11:39
specifications shared in the license so
00:11:41
there are specific clauses to it that
00:11:45
could enable someone to reuse that
00:11:47
particular piece of work there are also
00:11:50
artists and creators who make their
00:11:52
works available for everyone meaning
00:11:55
there are no rights reserved or there
00:11:57
are no restrictions to the use of that
00:12:00
particular work and these are all under
00:12:02
public domain if it's under public
00:12:05
domain then you could freely use that
00:12:09
particular word without permission from
00:12:11
the creator or the author another kind
00:12:14
of intellectual property is the patent
00:12:16
you probably would have heard of it in
00:12:19
terms of inventions and that is correct
00:12:21
because a patent is described as an
00:12:24
exclusive right granted for an invention
00:12:27
which could be a product or a process
00:12:30
that provides in general a new way of
00:12:34
doing something or offers a new
00:12:36
technical solution to a problem filing
00:12:39
for a patent provides the right to
00:12:41
consent on the invention or a way for
00:12:44
others to use it therefore filing for a
00:12:47
patent means that you are establishing
00:12:50
credibility as the inventor as a creator
00:12:54
of that particular product or process
00:12:57
but you are also making it available for
00:13:00
others to duplicate or replicate on
00:13:04
their own that is the reason why when
00:13:06
you are filing for a patent you are also
00:13:09
giving the technical information about
00:13:12
the invention to the public here are
00:13:14
some of the famous patents around the
00:13:16
world so for example this one the patent
00:13:19
that has been filed by thomas edison for
00:13:21
the light bulb the concept of the drone
00:13:24
was filed by edward g van der lipp it is
00:13:26
actually apple who holds the patent for
00:13:29
the smartphone that we know now or the
00:13:31
touch screen phone another intellectual
00:13:34
property right is the trademark so this
00:13:37
one you probably would see this on
00:13:40
specific goods or services this is a
00:13:43
distinguished sign that identifies in
00:13:46
different shades from one enterprise to
00:13:48
another it is a signature mark what
00:13:51
makes that product what makes that god
00:13:54
what makes that services different from
00:13:56
the others some trademark symbols
00:13:59
include of course the letter r enclosed
00:14:01
in a circle which is what we refer to as
00:14:04
a registered trademark pm which stands
00:14:07
for unregistered trademark and sm which
00:14:11
stands for unregistered
00:14:13
service trademark some of the valuable
00:14:16
trademarks in the world include that of
00:14:19
mcdonald's apple and of course google
00:14:22
next up we have industrial design this
00:14:25
intellectual property right protects
00:14:28
only the appearance or aesthetic
00:14:30
features of a product such as its shape
00:14:33
the surface its patterns lines or even
00:14:37
the color so take for example the
00:14:40
following these are some of the most
00:14:42
famous industrial designs in the world
00:14:45
number one is of course coke or
00:14:47
coca-cola's glass bottle you would
00:14:49
notice that the design of the bottle is
00:14:51
very distinct to the company and could
00:14:54
easily be attributed to
00:14:59
another example is the red soles of the
00:15:02
shoes of the highly popular luxury brand
00:15:06
christian louboutin
00:15:07
and of course last but not the least is
00:15:10
the vespa because of their industrial
00:15:13
design intellectual property right it is
00:15:16
easy for us to spot a vespa because no
00:15:19
other scooter or motorbike manufacturers
00:15:23
actually produce the same design as that
00:15:25
of a vespa it's very distinct it's a
00:15:28
very unique last but not the least we
00:15:30
have the geographical indications and
00:15:33
appellations of origin simply put these
00:15:36
are signs that we usually use on
00:15:39
products possessing qualities or status
00:15:43
or characteristics that could be
00:15:46
essentially attributable to that
00:15:49
location of origin so meaning this
00:15:52
particular product because of certain
00:15:54
qualities to it is only specific to that
00:15:57
particular place or country for example
00:16:01
to illustrate geographical indications
00:16:03
and appellations of origin we have of
00:16:06
course strawberry jam you would know
00:16:08
that if it already has that bag yo
00:16:11
special or even the name of the place
00:16:14
you know that it's really good because
00:16:16
we all know that here in the philippines
00:16:19
strawberries good strawberries at that
00:16:22
would often come from baglio similarly
00:16:25
we have of course the dried mangoes of
00:16:29
cebu here in the philippines all of
00:16:32
those intellectual property rights are
00:16:35
covered by the intellectual property
00:16:37
code of the philippines or republic act
00:16:40
8293 any infringement on intellectual
00:16:44
property rights could be brought to the
00:16:46
attention of our intellectual property
00:16:49
office here in the philippines so on
00:16:51
your screen right now you could see some
00:16:53
of the examples of works and the
00:16:55
validity period of infringement claims
00:16:57
that you could make let us now move on
00:16:59
to another issue in media and
00:17:01
information literacy have you ever tried
00:17:04
googling yourself or searching for
00:17:06
yourself on google some of you might
00:17:09
have noticed that even without you
00:17:11
sharing those pieces of information
00:17:13
explicitly on the internet they are
00:17:16
there other people could easily access
00:17:18
it with a simple search on a search
00:17:20
engine some of you might have also
00:17:22
experienced having their facebook
00:17:25
accounts hack or someone else trying to
00:17:28
log in into your personal facebook
00:17:31
accounts if that is the case then most
00:17:34
likely your data privacy has been
00:17:36
compromised there are actually a lot of
00:17:39
different issues related to data privacy
00:17:41
which includes hacking for example
00:17:44
phishing and identity theft when we say
00:17:47
hacking it simply involves activities
00:17:50
that seek to compromise digital devices
00:17:52
such as computers smartphones tablets
00:17:56
and even entire networks so it's someone
00:17:59
trying to access
00:18:01
your own device your personal device
00:18:04
remotely with the intention of course of
00:18:07
doing something bad about what they're
00:18:09
going to be able to access it could be
00:18:12
described as an attempt to exploit a
00:18:15
computer system or a private network
00:18:17
inside a computer and could also refer
00:18:20
to unauthorized access to or control
00:18:24
over computer network security systems
00:18:27
for some illicit purposes so for
00:18:30
something that is bad something that is
00:18:32
not aligned with the original intention
00:18:35
of that particular computer network
00:18:38
system and so on and so forth just
00:18:40
recently there have been issues and news
00:18:43
about facebook getting hacked a few
00:18:45
years ago there was also someone that
00:18:47
tapped into different government
00:18:50
websites here in the philippines and a
00:18:52
few months ago you probably would
00:18:54
remember that one of the biggest banks
00:18:56
here in the philippines got hack and
00:18:59
their clients lost hundreds of thousands
00:19:02
in their accounts another issue on data
00:19:05
privacy and is actually a very common
00:19:07
one because many people have actually
00:19:09
fallen victim to this is what we refer
00:19:12
to as data phishing or phishing it is
00:19:15
simply described as a type of social
00:19:18
engineering attack often used to steal
00:19:21
user data including login credentials
00:19:24
and credit card numbers it is called
00:19:27
fishing because it is likened to actual
00:19:31
real phishing there's many ways in which
00:19:35
a victim is being reeled into the act
00:19:38
itself however unlike other kinds of
00:19:41
online turrets fishing does not really
00:19:43
require particularly sophisticated
00:19:46
technical expertise this is also the
00:19:49
reason why it is very common because it
00:19:52
is very easy to do there are many
00:19:54
different ways to attract your victims
00:19:58
or to trap your victims so take for
00:20:02
example on your email accounts you
00:20:04
probably received a lot of phishing
00:20:07
emails such as this one another common
00:20:10
issue in data privacy is identity theft
00:20:14
it occurs when a criminal obtains or
00:20:16
uses personal information of someone
00:20:19
else to assume their identity or access
00:20:22
to their accounts or the purpose of
00:20:25
committing fraud receiving benefits or
00:20:28
gaining financially in some way one
00:20:31
popular example of identity theft is
00:20:34
what this one u.s hacker did um this
00:20:37
particular hacker actually assumed the
00:20:39
identity of several rich people in
00:20:43
america and victimized many others in
00:20:46
the process despite all of these common
00:20:49
data privacy issues and concerns you
00:20:52
also have to remember that your data
00:20:54
privacy is protected by a particular law
00:20:57
so the national privacy commission is
00:20:59
entrusted with enacting the data privacy
00:21:02
act of 2012 for republic act 10 17 30.
00:21:06
aside from all of these common data
00:21:09
privacy issues there is also a thing
00:21:12
that we refer to as cyber crime cyber
00:21:15
crime or computer crime is any criminal
00:21:19
activity that involves the use of a
00:21:21
computer a network device or a network
00:21:24
as an instrument of further illegal aids
00:21:28
to do something illegal to commit a
00:21:31
crime in itself some other forms of
00:21:33
cyber crimes include piracy and illegal
00:21:36
downloads cyber squatting or staying in
00:21:40
a particular domain for a long periods
00:21:42
of time without even paying for that
00:21:45
domain or service online drug
00:21:48
trafficking cyber libel or cyber
00:21:50
defamation online harassment such as
00:21:53
cyber stalking internet trolling etc
00:21:57
internet pornography similarly alongside
00:22:00
that we also have online predators and
00:22:03
other sex crimes here in the philippines
00:22:06
cyber crimes are punishable because of
00:22:09
the cyber crime prevention act which was
00:22:12
enacted by the dict or the department in
00:22:15
information communications technology
00:22:18
and of course with the help of the
00:22:20
national bureau of investigation the
00:22:22
cyber crime prevention act or the public
00:22:25
app
00:22:26
10175 aims to address legal issues
00:22:30
concerning online interactions in the
00:22:32
internet in the philippines another
00:22:35
alarming issue in terms of technology
00:22:38
media and information is what we call
00:22:41
cyber bullying this particular act is
00:22:44
simply described as the use of digital
00:22:47
means of communication that could hurt
00:22:50
or harass a person such as intentionally
00:22:54
sending hurtful texts or sns messages
00:22:57
posting embarrassing photos or videos
00:22:59
and spreading malicious rumors online
00:23:02
here in the philippines it has been
00:23:04
reported several times already that
00:23:07
online bullying
00:23:08
remains prevalent especially towards
00:23:11
school-aged children so many of the
00:23:14
people
00:23:15
involved in cyber bullying and online
00:23:17
harassment are actually young kids
00:23:20
usually age 13 to 17. not only does this
00:23:24
affect victims mentally and leave them
00:23:28
traumatized for a long period of time
00:23:30
but this could also have devastating
00:23:32
effects that could also lead to death
00:23:35
another very common issue and is
00:23:37
actually quite alarming especially at
00:23:39
this time and age is the dissemination
00:23:42
of fake information fake or information
00:23:44
or what we often refer to as fake news
00:23:48
are simply stories or hoaxes created to
00:23:52
deliberately
00:23:53
misinform or deceive readers so there is
00:23:56
an intention to provide misinformation
00:24:00
and mal information and there is an
00:24:03
intention to trick its readers its
00:24:06
audience to believe into something else
00:24:09
now these are usually created to either
00:24:13
influence people's views push a
00:24:15
political agenda or cause confusion and
00:24:18
can often be a profitable business for
00:24:21
online publishers so it's very prevalent
00:24:24
here in the philippines especially right
00:24:27
now during the election season there are
00:24:29
also many different types of false
00:24:31
information this includes of course
00:24:33
clickbaits you would probably experience
00:24:36
this when visiting different websites or
00:24:39
web pages there are also what we refer
00:24:42
to as propaganda something that is not
00:24:45
real yet they are perpetuating it as the
00:24:47
truth satires and parodies could also be
00:24:50
considered as false information
00:24:53
especially if they are presented in a
00:24:56
manner that is similar to how truthful
00:24:59
facts are presented information that are
00:25:02
also presented in a false context could
00:25:05
already be considered as false
00:25:08
information manipulated content or
00:25:10
content that has been edited that has
00:25:13
been photoshopped are all forms of false
00:25:16
information misleading headlines are
00:25:19
also providing false information
00:25:22
similarly bias and slanted use are also
00:25:25
considered false information another
00:25:28
issue that we face right now with advent
00:25:31
of technology the computer and the
00:25:33
internet is the addiction to it commonly
00:25:36
referred to as computer addiction it is
00:25:39
our over dependence or a damaging need
00:25:42
to do something on a computer or the
00:25:44
internet and could be described simply
00:25:47
described as the excessive use of
00:25:49
computers to the extent that it
00:25:52
interferes with your daily life already
00:25:54
so you have become too dependent on
00:25:57
using the computer and it has negatively
00:26:01
affected your daily life and functioning
00:26:04
however you have to remember that
00:26:06
computer addiction does not just stem
00:26:09
from using too much computer there are
00:26:11
several triggers for it one computer
00:26:14
games could result to computer addiction
00:26:16
your addiction to computer games could
00:26:18
actually lead to your eventual computer
00:26:20
addiction online shopping which i guess
00:26:23
is very popular to a lot of you social
00:26:26
media as well your addiction to social
00:26:28
media your dependence to social media
00:26:30
could lead to computer addiction video
00:26:32
streaming and online gambling there are
00:26:35
also several effects of computer
00:26:37
addiction for example you might lose a
00:26:40
lot of sleep because of your overuse of
00:26:43
the computer it might also develop into
00:26:45
anxiety depression and may cause even
00:26:49
relationship problems another very
00:26:52
important issue that we have to discuss
00:26:54
is the so-called digital divide because
00:26:57
this does not only happen here in the
00:26:59
philippines but it is already happening
00:27:02
around the world digital divide is
00:27:04
simply described as the digital
00:27:06
inequality or gap between groups in
00:27:09
terms of knowledge usage and access to
00:27:12
ict due to several circumstances such as
00:27:16
the location the income and even the age
00:27:19
so take for example during this pandemic
00:27:22
you would notice that the digital divide
00:27:24
has been very very prevalent this is
00:27:28
true of course to the fact that we had
00:27:29
to depend to technology in order for us
00:27:32
to connect and continue many of our
00:27:34
everyday transactions including for one
00:27:37
and occasion so take this one for
00:27:39
example here in the philippines not a
00:27:42
lot of our students have access to the
00:27:44
internet a stable internet connection
00:27:46
not a lot of them have access to a
00:27:49
gadget that they could use for schooling
00:27:51
so even if they do want to continue with
00:27:54
their education since they don't have
00:27:56
the gadget for it they couldn't access
00:27:58
it even if they have the gadget for it
00:28:00
they were not able to do so another good
00:28:03
example that illustrates digital divide
00:28:07
in terms of age especially during the
00:28:09
transition from traditional classroom to
00:28:12
the online classroom is the difficulty
00:28:14
of many old teachers to use their
00:28:17
laptops their computers and conduct
00:28:20
their classes online and obviously since
00:28:22
they are not born in the so-called
00:28:24
computer generation it's difficult for
00:28:27
them to even manipulate the device that
00:28:31
they have including of course the many
00:28:33
platforms that are being presented to
00:28:36
them and are being asked of them to use
00:28:38
now that you are aware of the many
00:28:40
different issues concerning the use of
00:28:43
media information and technology it
00:28:46
would be easy for you to practice
00:28:48
responsible digital citizenship also
00:28:51
part of being a responsible digital
00:28:54
citizen requires you to also follow
00:28:57
different netiquette so what is
00:29:00
netiquette it is simply defined as a set
00:29:03
of rules for proper and acceptable
00:29:05
online behavior it also denotes the
00:29:08
proper attitude that one should have and
00:29:11
observed when communicating online
00:29:13
netiquette is actually a portmanteau of
00:29:15
the words network etiquette according to
00:29:18
xi in 1994 there are 10 core rules of
00:29:22
netiquette first one is remember the
00:29:25
human remember that even if you are
00:29:27
using the computer you are still
00:29:29
interacting with another person second
00:29:32
adhere to the same standards of behavior
00:29:34
online that you would follow in real
00:29:37
life so what you want to do or what you
00:29:40
are expected to do while interacting
00:29:43
face to face in real life with other
00:29:46
people that's how you should also act
00:29:48
when you are interacting with people
00:29:50
online it is also important to know
00:29:53
where you are in cyberspace having
00:29:56
knowledge of where you are also allows
00:30:00
you to determine how to interact how to
00:30:03
act inside that cyberspace you also need
00:30:07
to respect other people's time and their
00:30:10
bandwidth so if it's not possible for
00:30:13
them to join you in this particular
00:30:15
endeavor because of limitations to their
00:30:18
connection then do not force it
00:30:20
according to the core rules of
00:30:21
netiquette you also need to present
00:30:23
yourself well when you are online so you
00:30:27
need to make yourself look good online
00:30:30
if you have that knowledge then it's
00:30:33
best that you share your expert
00:30:35
knowledge but of course remember that
00:30:37
when you are sharing knowledge and
00:30:38
information stick to what is true stick
00:30:41
to what is factual as a netizen you also
00:30:44
have that responsibility to help keep
00:30:47
flame wars under control so what do we
00:30:50
mean by flame wars if you know that two
00:30:52
people are already fighting online then
00:30:55
don't add fuel to the fire okay so
00:30:58
simply put do not engage in something
00:31:00
that is very unproductive also when you
00:31:03
are online please do not promote
00:31:05
divisiveness especially among members of
00:31:09
the community or members of a particular
00:31:11
group you also have to respect other
00:31:13
people's privacy the same way that you
00:31:16
want them to respect your own having
00:31:18
access to media information and
00:31:21
technology is already power like what we
00:31:24
have mentioned earlier so as someone who
00:31:26
is in constant use of these advancements
00:31:30
do not abuse that power be responsible
00:31:34
be accountable last but not the least be
00:31:36
forgiving of other people's mistakes
00:31:39
here are my sources and references for
00:31:41
this lecture thank you
00:31:48
you