Lesson 6: Legal, Ethical, and Societal Issues in Media and Information Literacy | MIL

00:31:49
https://www.youtube.com/watch?v=J1uZowvZT7g

Summary

TLDRThe video lesson explores the key legal, ethical, and societal challenges in media and information literacy. It emphasizes the importance of understanding digital citizenship, which involves responsibly using and interacting with digital technology. The discussion covers critical issues like intellectual property, explaining the different rights such as copyright, patent, and trademark, and the problems of plagiarism and fair use. It also delves into data privacy concerns, identifying common threats like hacking, phishing, and identity theft, and outlines the legal statutes that protect these rights. Furthermore, it examines various cyber crimes, including online piracy, cyberbullying, and the spread of false information or fake news, highlighting the need for truthful digital engagement. The topic of computer addiction is discussed, recognizing its adverse effects on daily life and relationships. Finally, the lesson addresses the digital divide, a significant issue where disparities in technology access and knowledge exist, particularly highlighted during the pandemic. The video concludes with a focus on netiquette, providing guidelines for respectful and ethical online behavior to promote a positive digital environment.

Takeaways

  • 📱 Digital Citizenship: Responsible use of technology is crucial for ethical online engagement.
  • 🔒 Intellectual Property: Protects creations of the mind, essential to understand in digital spaces.
  • ✏️ Plagiarism: Using others' work without credit is unethical and considered theft.
  • 🛡️ Data Privacy: Crucial for protecting personal information from unauthorized access.
  • 💻 Cyber Crime: Illegal activities using computers pose serious threats to users.
  • 👩‍💻 Cyberbullying: Involves bullying through digital channels, leading to severe consequences.
  • 📰 Fake News: Spread of false information can misinform or deceive audiences.
  • ⌨️ Computer Addiction: Excessive use of computers can disrupt daily life and relationships.
  • 🌐 Digital Divide: The gap in ICT access and knowledge is a global issue.
  • 💡 Netiquette: Proper online behavior is essential for respectful interactions.
  • 🤝 Fair Use: Allows for limited use of copyrighted work for specific purposes.
  • ⚖️ Legal Frameworks: Various laws exist to protect digital rights and privacy.

Timeline

  • 00:00:00 - 00:05:00

    The lesson begins with an introduction to legal, ethical, and societal issues in media and information literacy. Today's focus is on digital citizenship, which includes understanding topics such as intellectual property, plagiarism, data privacy, cyber crimes, cyber bullying, fake news, computer addiction, and the digital divide. The importance of responsible technology use is underscored by the power-balance analogy from the Spider-Man quote: "With great power comes great responsibility." Emphasis is placed on understanding digital citizenship as engaging ethically and safely with technology and information.

  • 00:05:00 - 00:10:00

    The discussion starts with "intellectual property"—a central theme in media literacy. Intellectual property (IP) involves creations of the mind, including inventions, literary and artistic works, and designs. Various types of IP are explained: copyright, patent, trademark, industrial design, and geographical indications. Copyright protection gives creators exclusive rights to their literary and artistic works. Famous infringement claims such as those involving League of Legends vs. Mobile Legends and the Ice Ice Baby song highlight the importance of respecting IP rights. The session stresses the integrity of acknowledging original work and discusses plagiarism as unauthorized use of another's work.

  • 00:10:00 - 00:15:00

    The concept of 'fair use' is introduced, permitting limited use of copyrighted material without a license for commentary, criticism, teaching, etc. It underscores the balance between copyright protection and the accessibility of information. Other forms of rights include Creative Commons, which allows reuse with certain restrictions, and public domain, where works can be freely used. Patents, another form of IP, protect inventions, requiring disclosure for public benefit while granting exclusive rights to the inventor. Familiar examples such as the light bulb and smartphone illustrate patents' significance. Trademarks distinguish goods or services and are identified by symbols like the registered trademark (R).

  • 00:15:00 - 00:20:00

    Next, industrial design, which protects aesthetic aspects of products, and geographical indications, which associate products with specific locations, are discussed. The session highlights the legal frameworks, such as the Intellectual Property Code of the Philippines, for protecting these rights. Shifting focus to data privacy, issues like hacking, phishing, and identity theft are examined. Hacking involves unauthorized access to systems, while phishing tricks users into providing personal data. These discussions emphasize the importance of privacy protections, with the Data Privacy Act in the Philippines safeguarding personal information.

  • 00:20:00 - 00:25:00

    Cybercrime is defined as criminal activity involving computers or networks, with examples such as piracy and online defamation. The Cybercrime Prevention Act in the Philippines aims to combat these issues. The session highlights cyberbullying as a major concern, particularly affecting young people, and fake news, which intentionally spreads misinformation. These issues underscore the need for media literacy in discerning credible information. Additionally, computer addiction is explored, described as excessive use interfering with daily life, and the digital divide, highlighting inequalities in access to technology due to factors like location and income.

  • 00:25:00 - 00:31:49

    Finally, 'netiquette' is explored as a set of guidelines for appropriate online behavior. The session concludes by discussing key rules, such as respecting others, presenting oneself well online, and sharing accurate information. Emphasizing the ethical use of technology and information is critical. The discussion points to the responsibility of digital citizens to maintain respectful and productive online communities and to combat divisiveness. The importance of understanding one's own digital rights and responsibilities to navigate the online world safely and ethically is reiterated.

Show more

Mind Map

Video Q&A

  • What is digital citizenship?

    Digital citizenship is the responsible use of technology, where individuals use and engage with digital content safely, ethically, and critically.

  • What is intellectual property?

    Intellectual property refers to creations of the mind, like inventions, designs, and literary works, protected by various rights like copyrights and patents.

  • How is plagiarism defined?

    Plagiarism is using someone else's work or ideas without permission and claiming them as your own, which is a form of intellectual theft.

  • What is the concept of fair use?

    Fair use is a legal principle allowing the use of copyrighted work without permission for purposes such as commentary, criticism, teaching, and research.

  • What is data privacy?

    Data privacy refers to the protection of personal information from being accessed or shared without consent, often challenged by hacking and identity theft.

  • What constitutes cyber crime?

    Cyber crime involves illegal activities using computers or networks, such as hacking, online harassment, and identity theft.

  • How does cyberbullying occur?

    Cyberbullying involves bullying through digital means like hurtful messages, embarrassing content, or spreading malicious rumors online.

  • What is fake news?

    Fake news includes false or misleading information meant to deceive or misinform people, often for political or financial gain.

  • What is computer addiction?

    Computer addiction is an excessive dependency on computers or the internet, interfering with daily life and relationships.

  • What is the digital divide?

    The digital divide is the gap in access, knowledge, and usage of ICT between different groups, often influenced by location, income, or age.

View more video summaries

Get instant access to free YouTube video summaries powered by AI!
Subtitles
en
Auto Scroll:
  • 00:00:00
    [Music]
  • 00:00:18
    good day everyone welcome back to media
  • 00:00:20
    and information literacy for our sixth
  • 00:00:23
    lesson we will be discussing the
  • 00:00:24
    different legal ethical and societal
  • 00:00:27
    issues in media and information literacy
  • 00:00:30
    for today we will be covering a variety
  • 00:00:32
    of different topics that are related to
  • 00:00:34
    digital citizenship the different issues
  • 00:00:37
    in media and information literacy such
  • 00:00:39
    as intellectual property and plagiarism
  • 00:00:42
    data privacy other forms of cyber crimes
  • 00:00:45
    cyber bullying fake information or what
  • 00:00:48
    we refer to as fake news
  • 00:00:50
    we will also be discussing computer
  • 00:00:52
    addiction and digital divide towards the
  • 00:00:55
    end of our lesson you will also be
  • 00:00:57
    talking about netiquette there is no
  • 00:00:59
    doubt that the world that we are living
  • 00:01:01
    in right now is highly advanced in terms
  • 00:01:03
    of technology which has of course been
  • 00:01:07
    ingrained into our daily lives for
  • 00:01:09
    example you have your cell phones your
  • 00:01:12
    smartphones that they use to communicate
  • 00:01:15
    talk to people before robots are only
  • 00:01:18
    part of science fiction but right now we
  • 00:01:20
    are living in a society that actually
  • 00:01:22
    has a lot of robots that not only can we
  • 00:01:25
    use in terms of industry production but
  • 00:01:28
    also robots that we could interact with
  • 00:01:30
    similarly the concepts of augmented
  • 00:01:32
    reality and virtual reality have already
  • 00:01:35
    been a great part of our discussion when
  • 00:01:38
    it comes to technology and advancements
  • 00:01:41
    aside from that all the information that
  • 00:01:43
    you might need even those that you are
  • 00:01:46
    not looking for could easily be accessed
  • 00:01:48
    with a touch of your finger or a click
  • 00:01:51
    of a button because of all of these
  • 00:01:53
    technological advancements a lot of the
  • 00:01:56
    things that we used to do have become so
  • 00:01:59
    much easier to accomplish especially in
  • 00:02:02
    terms of communication as well as
  • 00:02:05
    forming and establishing connections
  • 00:02:08
    with other people regardless whether
  • 00:02:10
    they are close to you in terms of
  • 00:02:12
    geography or not if you have seen the
  • 00:02:15
    movie spider-man then you probably would
  • 00:02:18
    know about this quote according to uncle
  • 00:02:20
    ben who was one of the characters in the
  • 00:02:22
    franchise he said that the great power
  • 00:02:25
    comes great responsibility and with
  • 00:02:27
    advancements that we have right now in
  • 00:02:30
    our society in terms of technology we
  • 00:02:33
    have harnessed so much power we could do
  • 00:02:36
    so much because of it but one thing that
  • 00:02:39
    you have to remember is that since you
  • 00:02:41
    are holding so much power in your hand
  • 00:02:44
    so much potential in your hand you also
  • 00:02:46
    need to be responsible and accountable
  • 00:02:49
    for what you do and how you use that
  • 00:02:52
    power and that is basically what we're
  • 00:02:54
    gonna talk about for today's lesson let
  • 00:02:56
    us begin our discussion with unpacking
  • 00:02:59
    the term digital citizenship digital
  • 00:03:02
    citizenship according to unesco in 2016
  • 00:03:06
    is simply your ability to find access
  • 00:03:09
    use and create information effectively
  • 00:03:12
    it is also described as your ability to
  • 00:03:14
    engage with other users and with content
  • 00:03:17
    in an active critical sensitive and
  • 00:03:20
    ethical manner as well as navigating the
  • 00:03:23
    online and ict environment safely and
  • 00:03:26
    responsibly with you being aware of your
  • 00:03:30
    own rights as users simply put digital
  • 00:03:34
    citizenship refers to our responsible
  • 00:03:38
    use of technology and all the
  • 00:03:41
    advancements that it has brought upon us
  • 00:03:44
    especially in this digital world digital
  • 00:03:47
    citizenship also entails you knowing
  • 00:03:50
    about the different issues in media and
  • 00:03:52
    information literacy because if you are
  • 00:03:55
    aware of all of these issues all of
  • 00:03:58
    these potential problems then it would
  • 00:04:00
    be easier for you to engage to
  • 00:04:03
    participate in the discussion of
  • 00:04:06
    responsible digital use let us take this
  • 00:04:09
    one for example have you ever
  • 00:04:11
    experienced having to come up with a
  • 00:04:14
    very novel idea or a very good idea but
  • 00:04:18
    then eventually
  • 00:04:19
    someone else stole it from you that
  • 00:04:23
    actually could already be an
  • 00:04:25
    infringement of your intellectual
  • 00:04:27
    property rights but what exactly is
  • 00:04:30
    intellectual property intellectual
  • 00:04:32
    property according to the world
  • 00:04:34
    intellectual property organization in
  • 00:04:36
    2016
  • 00:04:38
    simply refers to the creations of the
  • 00:04:41
    mind such as inventions literary and
  • 00:04:45
    artistic works designs symbols names and
  • 00:04:49
    images used in commerce so it is simply
  • 00:04:53
    a novel idea something that is new
  • 00:04:56
    something that hasn't been done before
  • 00:04:58
    that could be attributed to a specific
  • 00:05:01
    person there are also different types of
  • 00:05:03
    intellectual property the first one is
  • 00:05:06
    copyright next is the patent third is
  • 00:05:09
    the trademark next one is industrial
  • 00:05:11
    design and the last one is what we refer
  • 00:05:14
    to as geographical indications and
  • 00:05:16
    appellations of origin let us define all
  • 00:05:19
    of these types one by one copyright is a
  • 00:05:22
    legal term that is used to describe the
  • 00:05:25
    rights that creators have over their
  • 00:05:28
    literary and artistic works and often it
  • 00:05:31
    gives the creator the sole right to
  • 00:05:34
    publish and sell that work having filed
  • 00:05:37
    for a copyright therefore gives that
  • 00:05:40
    specific person especially the creator
  • 00:05:43
    of that particular literary or artistic
  • 00:05:46
    work the right to distribute his or her
  • 00:05:50
    own work meaning no other person could
  • 00:05:53
    use that particular literary or artistic
  • 00:05:57
    work without the permission of the
  • 00:06:00
    copyright owner especially if they
  • 00:06:02
    intend to make money out of using that
  • 00:06:05
    particular work of art or work of
  • 00:06:08
    literature filing for a copyright is
  • 00:06:11
    very important because it protects the
  • 00:06:13
    form of material expression and is only
  • 00:06:16
    available for works that are fixed
  • 00:06:19
    tangible form meaning it has to be
  • 00:06:21
    something that could be touched it could
  • 00:06:24
    be felt by the hand however it is very
  • 00:06:27
    important to remember that filing for a
  • 00:06:29
    copyright is not always mandatory but it
  • 00:06:32
    is recommended when someone violates
  • 00:06:35
    this particular intellectual property
  • 00:06:38
    right then it is called an infringement
  • 00:06:41
    here are some of the famous copyright
  • 00:06:43
    infringement claims in the world so for
  • 00:06:46
    example league of legends actually filed
  • 00:06:49
    for a copyright infringement claim
  • 00:06:51
    against the creators of mobile legends
  • 00:06:54
    because the creators of league of
  • 00:06:57
    legends said that many of the aspects
  • 00:07:00
    and features of mobile legends were
  • 00:07:03
    actually derived from the
  • 00:07:06
    game league of legends another very
  • 00:07:09
    famous copyright infringement claim is
  • 00:07:12
    that of freddie mercury and david bowie
  • 00:07:14
    versus the creator of the song ice ice
  • 00:07:17
    baby because
  • 00:07:19
    they claim that some of the beats in the
  • 00:07:22
    song are similar to the beats of the
  • 00:07:24
    other another copyright infringement
  • 00:07:26
    claim is this particular picture of
  • 00:07:29
    barack obama so this was taken by a
  • 00:07:30
    photographer and it became very very
  • 00:07:33
    popular throughout the internet and then
  • 00:07:35
    a modern artist actually used this
  • 00:07:37
    photograph to create his or her own work
  • 00:07:41
    of art here in the philippines one very
  • 00:07:43
    famous copyright infringement claim is
  • 00:07:45
    that of huawei vs willing wheelie the
  • 00:07:48
    shows okay so according to the producers
  • 00:07:52
    and the creators of huawei willingwilly
  • 00:07:55
    actually has the same format same
  • 00:07:57
    concept as that of the original show
  • 00:08:00
    part of the discussion of copyright and
  • 00:08:02
    copyright infringement claims is the
  • 00:08:05
    term plagiarism i know that as students
  • 00:08:07
    you are very much familiar with what
  • 00:08:10
    this term is all about plagiarism is
  • 00:08:13
    simply defined as an act or an instance
  • 00:08:16
    of using or closely imitating the
  • 00:08:18
    language and thoughts of another author
  • 00:08:22
    without authorization meaning without
  • 00:08:25
    consent from that author it could also
  • 00:08:27
    be the representation of that particular
  • 00:08:30
    author's work as one's own meaning you
  • 00:08:33
    are claiming it as your own as by not
  • 00:08:36
    crediting the original author so failure
  • 00:08:40
    to give credit where credit is ju is
  • 00:08:43
    actually an act of plagiarism here are
  • 00:08:46
    some examples of common acts of
  • 00:08:48
    plagiarism some of you might think that
  • 00:08:51
    these are simple and could easily be
  • 00:08:53
    dismissed but actually it's not remember
  • 00:08:56
    that plagiarism is an act of crime
  • 00:08:59
    remember that it is an app of cheating
  • 00:09:02
    and stealing first copying media
  • 00:09:04
    especially images from other websites to
  • 00:09:07
    paste them into your own papers or
  • 00:09:09
    websites is already an act of plagiarism
  • 00:09:12
    especially if you are not giving credit
  • 00:09:15
    to who it belong to another example is
  • 00:09:18
    making a video using footage from others
  • 00:09:21
    videos or using copyrighted music as
  • 00:09:24
    part of your own soundtrack that could
  • 00:09:26
    also be an act of plagiarism performing
  • 00:09:29
    another person's copyrighted music for
  • 00:09:32
    example you are playing a cover and then
  • 00:09:35
    claiming it as if it's your own song
  • 00:09:37
    then that could be an act of pleasure
  • 00:09:39
    you're saying composing a piece of music
  • 00:09:41
    that borrows heavily from another
  • 00:09:44
    composition is also an act of teachers
  • 00:09:47
    and many of you are probably wondering
  • 00:09:49
    what if that particular piece of media
  • 00:09:52
    is already available on the internet as
  • 00:09:55
    a resource then that is where
  • 00:09:58
    the next concept is gonna come in and
  • 00:10:01
    that is the concept of fair use we have
  • 00:10:05
    this thing called fair use so that you
  • 00:10:07
    don't always get to be accused of
  • 00:10:09
    stealing someone else's work or
  • 00:10:11
    plagiarizing someone else's work so what
  • 00:10:14
    is fair use it is basically a legal
  • 00:10:17
    principle in which one can use a
  • 00:10:20
    copyrighted work without a license for
  • 00:10:22
    the following purposes number one for
  • 00:10:25
    commentary
  • 00:10:26
    for criticism of that particular word
  • 00:10:30
    for reporting about that particular work
  • 00:10:33
    research you could include it and of
  • 00:10:35
    course for teaching purposes just like
  • 00:10:38
    what i am doing right now so many of the
  • 00:10:40
    images that i have been using for my
  • 00:10:43
    lectures are lifted from the internet
  • 00:10:46
    because that's the only source that i
  • 00:10:48
    could get them from however since i'm
  • 00:10:50
    using it to teach my students i am still
  • 00:10:53
    under the clause of fair use but if i am
  • 00:10:57
    making money out of it for example i am
  • 00:11:01
    selling all of these materials and
  • 00:11:03
    making money out of it then that could
  • 00:11:06
    be already grounds for copyright
  • 00:11:09
    infringement claims there is also what
  • 00:11:12
    we refer to as the spectrum of right so
  • 00:11:15
    it begins of course with copyrights
  • 00:11:17
    wherein the use or reuse of that
  • 00:11:20
    particular media or medium requires the
  • 00:11:23
    permission from the copyright owner
  • 00:11:25
    there is also this thing called creative
  • 00:11:28
    commons which i guess you have all
  • 00:11:30
    encountered wherein wherein some rights
  • 00:11:33
    of the owner are reserved reuse is
  • 00:11:36
    permitted without permission under
  • 00:11:39
    specifications shared in the license so
  • 00:11:41
    there are specific clauses to it that
  • 00:11:45
    could enable someone to reuse that
  • 00:11:47
    particular piece of work there are also
  • 00:11:50
    artists and creators who make their
  • 00:11:52
    works available for everyone meaning
  • 00:11:55
    there are no rights reserved or there
  • 00:11:57
    are no restrictions to the use of that
  • 00:12:00
    particular work and these are all under
  • 00:12:02
    public domain if it's under public
  • 00:12:05
    domain then you could freely use that
  • 00:12:09
    particular word without permission from
  • 00:12:11
    the creator or the author another kind
  • 00:12:14
    of intellectual property is the patent
  • 00:12:16
    you probably would have heard of it in
  • 00:12:19
    terms of inventions and that is correct
  • 00:12:21
    because a patent is described as an
  • 00:12:24
    exclusive right granted for an invention
  • 00:12:27
    which could be a product or a process
  • 00:12:30
    that provides in general a new way of
  • 00:12:34
    doing something or offers a new
  • 00:12:36
    technical solution to a problem filing
  • 00:12:39
    for a patent provides the right to
  • 00:12:41
    consent on the invention or a way for
  • 00:12:44
    others to use it therefore filing for a
  • 00:12:47
    patent means that you are establishing
  • 00:12:50
    credibility as the inventor as a creator
  • 00:12:54
    of that particular product or process
  • 00:12:57
    but you are also making it available for
  • 00:13:00
    others to duplicate or replicate on
  • 00:13:04
    their own that is the reason why when
  • 00:13:06
    you are filing for a patent you are also
  • 00:13:09
    giving the technical information about
  • 00:13:12
    the invention to the public here are
  • 00:13:14
    some of the famous patents around the
  • 00:13:16
    world so for example this one the patent
  • 00:13:19
    that has been filed by thomas edison for
  • 00:13:21
    the light bulb the concept of the drone
  • 00:13:24
    was filed by edward g van der lipp it is
  • 00:13:26
    actually apple who holds the patent for
  • 00:13:29
    the smartphone that we know now or the
  • 00:13:31
    touch screen phone another intellectual
  • 00:13:34
    property right is the trademark so this
  • 00:13:37
    one you probably would see this on
  • 00:13:40
    specific goods or services this is a
  • 00:13:43
    distinguished sign that identifies in
  • 00:13:46
    different shades from one enterprise to
  • 00:13:48
    another it is a signature mark what
  • 00:13:51
    makes that product what makes that god
  • 00:13:54
    what makes that services different from
  • 00:13:56
    the others some trademark symbols
  • 00:13:59
    include of course the letter r enclosed
  • 00:14:01
    in a circle which is what we refer to as
  • 00:14:04
    a registered trademark pm which stands
  • 00:14:07
    for unregistered trademark and sm which
  • 00:14:11
    stands for unregistered
  • 00:14:13
    service trademark some of the valuable
  • 00:14:16
    trademarks in the world include that of
  • 00:14:19
    mcdonald's apple and of course google
  • 00:14:22
    next up we have industrial design this
  • 00:14:25
    intellectual property right protects
  • 00:14:28
    only the appearance or aesthetic
  • 00:14:30
    features of a product such as its shape
  • 00:14:33
    the surface its patterns lines or even
  • 00:14:37
    the color so take for example the
  • 00:14:40
    following these are some of the most
  • 00:14:42
    famous industrial designs in the world
  • 00:14:45
    number one is of course coke or
  • 00:14:47
    coca-cola's glass bottle you would
  • 00:14:49
    notice that the design of the bottle is
  • 00:14:51
    very distinct to the company and could
  • 00:14:54
    easily be attributed to
  • 00:14:59
    another example is the red soles of the
  • 00:15:02
    shoes of the highly popular luxury brand
  • 00:15:06
    christian louboutin
  • 00:15:07
    and of course last but not the least is
  • 00:15:10
    the vespa because of their industrial
  • 00:15:13
    design intellectual property right it is
  • 00:15:16
    easy for us to spot a vespa because no
  • 00:15:19
    other scooter or motorbike manufacturers
  • 00:15:23
    actually produce the same design as that
  • 00:15:25
    of a vespa it's very distinct it's a
  • 00:15:28
    very unique last but not the least we
  • 00:15:30
    have the geographical indications and
  • 00:15:33
    appellations of origin simply put these
  • 00:15:36
    are signs that we usually use on
  • 00:15:39
    products possessing qualities or status
  • 00:15:43
    or characteristics that could be
  • 00:15:46
    essentially attributable to that
  • 00:15:49
    location of origin so meaning this
  • 00:15:52
    particular product because of certain
  • 00:15:54
    qualities to it is only specific to that
  • 00:15:57
    particular place or country for example
  • 00:16:01
    to illustrate geographical indications
  • 00:16:03
    and appellations of origin we have of
  • 00:16:06
    course strawberry jam you would know
  • 00:16:08
    that if it already has that bag yo
  • 00:16:11
    special or even the name of the place
  • 00:16:14
    you know that it's really good because
  • 00:16:16
    we all know that here in the philippines
  • 00:16:19
    strawberries good strawberries at that
  • 00:16:22
    would often come from baglio similarly
  • 00:16:25
    we have of course the dried mangoes of
  • 00:16:29
    cebu here in the philippines all of
  • 00:16:32
    those intellectual property rights are
  • 00:16:35
    covered by the intellectual property
  • 00:16:37
    code of the philippines or republic act
  • 00:16:40
    8293 any infringement on intellectual
  • 00:16:44
    property rights could be brought to the
  • 00:16:46
    attention of our intellectual property
  • 00:16:49
    office here in the philippines so on
  • 00:16:51
    your screen right now you could see some
  • 00:16:53
    of the examples of works and the
  • 00:16:55
    validity period of infringement claims
  • 00:16:57
    that you could make let us now move on
  • 00:16:59
    to another issue in media and
  • 00:17:01
    information literacy have you ever tried
  • 00:17:04
    googling yourself or searching for
  • 00:17:06
    yourself on google some of you might
  • 00:17:09
    have noticed that even without you
  • 00:17:11
    sharing those pieces of information
  • 00:17:13
    explicitly on the internet they are
  • 00:17:16
    there other people could easily access
  • 00:17:18
    it with a simple search on a search
  • 00:17:20
    engine some of you might have also
  • 00:17:22
    experienced having their facebook
  • 00:17:25
    accounts hack or someone else trying to
  • 00:17:28
    log in into your personal facebook
  • 00:17:31
    accounts if that is the case then most
  • 00:17:34
    likely your data privacy has been
  • 00:17:36
    compromised there are actually a lot of
  • 00:17:39
    different issues related to data privacy
  • 00:17:41
    which includes hacking for example
  • 00:17:44
    phishing and identity theft when we say
  • 00:17:47
    hacking it simply involves activities
  • 00:17:50
    that seek to compromise digital devices
  • 00:17:52
    such as computers smartphones tablets
  • 00:17:56
    and even entire networks so it's someone
  • 00:17:59
    trying to access
  • 00:18:01
    your own device your personal device
  • 00:18:04
    remotely with the intention of course of
  • 00:18:07
    doing something bad about what they're
  • 00:18:09
    going to be able to access it could be
  • 00:18:12
    described as an attempt to exploit a
  • 00:18:15
    computer system or a private network
  • 00:18:17
    inside a computer and could also refer
  • 00:18:20
    to unauthorized access to or control
  • 00:18:24
    over computer network security systems
  • 00:18:27
    for some illicit purposes so for
  • 00:18:30
    something that is bad something that is
  • 00:18:32
    not aligned with the original intention
  • 00:18:35
    of that particular computer network
  • 00:18:38
    system and so on and so forth just
  • 00:18:40
    recently there have been issues and news
  • 00:18:43
    about facebook getting hacked a few
  • 00:18:45
    years ago there was also someone that
  • 00:18:47
    tapped into different government
  • 00:18:50
    websites here in the philippines and a
  • 00:18:52
    few months ago you probably would
  • 00:18:54
    remember that one of the biggest banks
  • 00:18:56
    here in the philippines got hack and
  • 00:18:59
    their clients lost hundreds of thousands
  • 00:19:02
    in their accounts another issue on data
  • 00:19:05
    privacy and is actually a very common
  • 00:19:07
    one because many people have actually
  • 00:19:09
    fallen victim to this is what we refer
  • 00:19:12
    to as data phishing or phishing it is
  • 00:19:15
    simply described as a type of social
  • 00:19:18
    engineering attack often used to steal
  • 00:19:21
    user data including login credentials
  • 00:19:24
    and credit card numbers it is called
  • 00:19:27
    fishing because it is likened to actual
  • 00:19:31
    real phishing there's many ways in which
  • 00:19:35
    a victim is being reeled into the act
  • 00:19:38
    itself however unlike other kinds of
  • 00:19:41
    online turrets fishing does not really
  • 00:19:43
    require particularly sophisticated
  • 00:19:46
    technical expertise this is also the
  • 00:19:49
    reason why it is very common because it
  • 00:19:52
    is very easy to do there are many
  • 00:19:54
    different ways to attract your victims
  • 00:19:58
    or to trap your victims so take for
  • 00:20:02
    example on your email accounts you
  • 00:20:04
    probably received a lot of phishing
  • 00:20:07
    emails such as this one another common
  • 00:20:10
    issue in data privacy is identity theft
  • 00:20:14
    it occurs when a criminal obtains or
  • 00:20:16
    uses personal information of someone
  • 00:20:19
    else to assume their identity or access
  • 00:20:22
    to their accounts or the purpose of
  • 00:20:25
    committing fraud receiving benefits or
  • 00:20:28
    gaining financially in some way one
  • 00:20:31
    popular example of identity theft is
  • 00:20:34
    what this one u.s hacker did um this
  • 00:20:37
    particular hacker actually assumed the
  • 00:20:39
    identity of several rich people in
  • 00:20:43
    america and victimized many others in
  • 00:20:46
    the process despite all of these common
  • 00:20:49
    data privacy issues and concerns you
  • 00:20:52
    also have to remember that your data
  • 00:20:54
    privacy is protected by a particular law
  • 00:20:57
    so the national privacy commission is
  • 00:20:59
    entrusted with enacting the data privacy
  • 00:21:02
    act of 2012 for republic act 10 17 30.
  • 00:21:06
    aside from all of these common data
  • 00:21:09
    privacy issues there is also a thing
  • 00:21:12
    that we refer to as cyber crime cyber
  • 00:21:15
    crime or computer crime is any criminal
  • 00:21:19
    activity that involves the use of a
  • 00:21:21
    computer a network device or a network
  • 00:21:24
    as an instrument of further illegal aids
  • 00:21:28
    to do something illegal to commit a
  • 00:21:31
    crime in itself some other forms of
  • 00:21:33
    cyber crimes include piracy and illegal
  • 00:21:36
    downloads cyber squatting or staying in
  • 00:21:40
    a particular domain for a long periods
  • 00:21:42
    of time without even paying for that
  • 00:21:45
    domain or service online drug
  • 00:21:48
    trafficking cyber libel or cyber
  • 00:21:50
    defamation online harassment such as
  • 00:21:53
    cyber stalking internet trolling etc
  • 00:21:57
    internet pornography similarly alongside
  • 00:22:00
    that we also have online predators and
  • 00:22:03
    other sex crimes here in the philippines
  • 00:22:06
    cyber crimes are punishable because of
  • 00:22:09
    the cyber crime prevention act which was
  • 00:22:12
    enacted by the dict or the department in
  • 00:22:15
    information communications technology
  • 00:22:18
    and of course with the help of the
  • 00:22:20
    national bureau of investigation the
  • 00:22:22
    cyber crime prevention act or the public
  • 00:22:25
    app
  • 00:22:26
    10175 aims to address legal issues
  • 00:22:30
    concerning online interactions in the
  • 00:22:32
    internet in the philippines another
  • 00:22:35
    alarming issue in terms of technology
  • 00:22:38
    media and information is what we call
  • 00:22:41
    cyber bullying this particular act is
  • 00:22:44
    simply described as the use of digital
  • 00:22:47
    means of communication that could hurt
  • 00:22:50
    or harass a person such as intentionally
  • 00:22:54
    sending hurtful texts or sns messages
  • 00:22:57
    posting embarrassing photos or videos
  • 00:22:59
    and spreading malicious rumors online
  • 00:23:02
    here in the philippines it has been
  • 00:23:04
    reported several times already that
  • 00:23:07
    online bullying
  • 00:23:08
    remains prevalent especially towards
  • 00:23:11
    school-aged children so many of the
  • 00:23:14
    people
  • 00:23:15
    involved in cyber bullying and online
  • 00:23:17
    harassment are actually young kids
  • 00:23:20
    usually age 13 to 17. not only does this
  • 00:23:24
    affect victims mentally and leave them
  • 00:23:28
    traumatized for a long period of time
  • 00:23:30
    but this could also have devastating
  • 00:23:32
    effects that could also lead to death
  • 00:23:35
    another very common issue and is
  • 00:23:37
    actually quite alarming especially at
  • 00:23:39
    this time and age is the dissemination
  • 00:23:42
    of fake information fake or information
  • 00:23:44
    or what we often refer to as fake news
  • 00:23:48
    are simply stories or hoaxes created to
  • 00:23:52
    deliberately
  • 00:23:53
    misinform or deceive readers so there is
  • 00:23:56
    an intention to provide misinformation
  • 00:24:00
    and mal information and there is an
  • 00:24:03
    intention to trick its readers its
  • 00:24:06
    audience to believe into something else
  • 00:24:09
    now these are usually created to either
  • 00:24:13
    influence people's views push a
  • 00:24:15
    political agenda or cause confusion and
  • 00:24:18
    can often be a profitable business for
  • 00:24:21
    online publishers so it's very prevalent
  • 00:24:24
    here in the philippines especially right
  • 00:24:27
    now during the election season there are
  • 00:24:29
    also many different types of false
  • 00:24:31
    information this includes of course
  • 00:24:33
    clickbaits you would probably experience
  • 00:24:36
    this when visiting different websites or
  • 00:24:39
    web pages there are also what we refer
  • 00:24:42
    to as propaganda something that is not
  • 00:24:45
    real yet they are perpetuating it as the
  • 00:24:47
    truth satires and parodies could also be
  • 00:24:50
    considered as false information
  • 00:24:53
    especially if they are presented in a
  • 00:24:56
    manner that is similar to how truthful
  • 00:24:59
    facts are presented information that are
  • 00:25:02
    also presented in a false context could
  • 00:25:05
    already be considered as false
  • 00:25:08
    information manipulated content or
  • 00:25:10
    content that has been edited that has
  • 00:25:13
    been photoshopped are all forms of false
  • 00:25:16
    information misleading headlines are
  • 00:25:19
    also providing false information
  • 00:25:22
    similarly bias and slanted use are also
  • 00:25:25
    considered false information another
  • 00:25:28
    issue that we face right now with advent
  • 00:25:31
    of technology the computer and the
  • 00:25:33
    internet is the addiction to it commonly
  • 00:25:36
    referred to as computer addiction it is
  • 00:25:39
    our over dependence or a damaging need
  • 00:25:42
    to do something on a computer or the
  • 00:25:44
    internet and could be described simply
  • 00:25:47
    described as the excessive use of
  • 00:25:49
    computers to the extent that it
  • 00:25:52
    interferes with your daily life already
  • 00:25:54
    so you have become too dependent on
  • 00:25:57
    using the computer and it has negatively
  • 00:26:01
    affected your daily life and functioning
  • 00:26:04
    however you have to remember that
  • 00:26:06
    computer addiction does not just stem
  • 00:26:09
    from using too much computer there are
  • 00:26:11
    several triggers for it one computer
  • 00:26:14
    games could result to computer addiction
  • 00:26:16
    your addiction to computer games could
  • 00:26:18
    actually lead to your eventual computer
  • 00:26:20
    addiction online shopping which i guess
  • 00:26:23
    is very popular to a lot of you social
  • 00:26:26
    media as well your addiction to social
  • 00:26:28
    media your dependence to social media
  • 00:26:30
    could lead to computer addiction video
  • 00:26:32
    streaming and online gambling there are
  • 00:26:35
    also several effects of computer
  • 00:26:37
    addiction for example you might lose a
  • 00:26:40
    lot of sleep because of your overuse of
  • 00:26:43
    the computer it might also develop into
  • 00:26:45
    anxiety depression and may cause even
  • 00:26:49
    relationship problems another very
  • 00:26:52
    important issue that we have to discuss
  • 00:26:54
    is the so-called digital divide because
  • 00:26:57
    this does not only happen here in the
  • 00:26:59
    philippines but it is already happening
  • 00:27:02
    around the world digital divide is
  • 00:27:04
    simply described as the digital
  • 00:27:06
    inequality or gap between groups in
  • 00:27:09
    terms of knowledge usage and access to
  • 00:27:12
    ict due to several circumstances such as
  • 00:27:16
    the location the income and even the age
  • 00:27:19
    so take for example during this pandemic
  • 00:27:22
    you would notice that the digital divide
  • 00:27:24
    has been very very prevalent this is
  • 00:27:28
    true of course to the fact that we had
  • 00:27:29
    to depend to technology in order for us
  • 00:27:32
    to connect and continue many of our
  • 00:27:34
    everyday transactions including for one
  • 00:27:37
    and occasion so take this one for
  • 00:27:39
    example here in the philippines not a
  • 00:27:42
    lot of our students have access to the
  • 00:27:44
    internet a stable internet connection
  • 00:27:46
    not a lot of them have access to a
  • 00:27:49
    gadget that they could use for schooling
  • 00:27:51
    so even if they do want to continue with
  • 00:27:54
    their education since they don't have
  • 00:27:56
    the gadget for it they couldn't access
  • 00:27:58
    it even if they have the gadget for it
  • 00:28:00
    they were not able to do so another good
  • 00:28:03
    example that illustrates digital divide
  • 00:28:07
    in terms of age especially during the
  • 00:28:09
    transition from traditional classroom to
  • 00:28:12
    the online classroom is the difficulty
  • 00:28:14
    of many old teachers to use their
  • 00:28:17
    laptops their computers and conduct
  • 00:28:20
    their classes online and obviously since
  • 00:28:22
    they are not born in the so-called
  • 00:28:24
    computer generation it's difficult for
  • 00:28:27
    them to even manipulate the device that
  • 00:28:31
    they have including of course the many
  • 00:28:33
    platforms that are being presented to
  • 00:28:36
    them and are being asked of them to use
  • 00:28:38
    now that you are aware of the many
  • 00:28:40
    different issues concerning the use of
  • 00:28:43
    media information and technology it
  • 00:28:46
    would be easy for you to practice
  • 00:28:48
    responsible digital citizenship also
  • 00:28:51
    part of being a responsible digital
  • 00:28:54
    citizen requires you to also follow
  • 00:28:57
    different netiquette so what is
  • 00:29:00
    netiquette it is simply defined as a set
  • 00:29:03
    of rules for proper and acceptable
  • 00:29:05
    online behavior it also denotes the
  • 00:29:08
    proper attitude that one should have and
  • 00:29:11
    observed when communicating online
  • 00:29:13
    netiquette is actually a portmanteau of
  • 00:29:15
    the words network etiquette according to
  • 00:29:18
    xi in 1994 there are 10 core rules of
  • 00:29:22
    netiquette first one is remember the
  • 00:29:25
    human remember that even if you are
  • 00:29:27
    using the computer you are still
  • 00:29:29
    interacting with another person second
  • 00:29:32
    adhere to the same standards of behavior
  • 00:29:34
    online that you would follow in real
  • 00:29:37
    life so what you want to do or what you
  • 00:29:40
    are expected to do while interacting
  • 00:29:43
    face to face in real life with other
  • 00:29:46
    people that's how you should also act
  • 00:29:48
    when you are interacting with people
  • 00:29:50
    online it is also important to know
  • 00:29:53
    where you are in cyberspace having
  • 00:29:56
    knowledge of where you are also allows
  • 00:30:00
    you to determine how to interact how to
  • 00:30:03
    act inside that cyberspace you also need
  • 00:30:07
    to respect other people's time and their
  • 00:30:10
    bandwidth so if it's not possible for
  • 00:30:13
    them to join you in this particular
  • 00:30:15
    endeavor because of limitations to their
  • 00:30:18
    connection then do not force it
  • 00:30:20
    according to the core rules of
  • 00:30:21
    netiquette you also need to present
  • 00:30:23
    yourself well when you are online so you
  • 00:30:27
    need to make yourself look good online
  • 00:30:30
    if you have that knowledge then it's
  • 00:30:33
    best that you share your expert
  • 00:30:35
    knowledge but of course remember that
  • 00:30:37
    when you are sharing knowledge and
  • 00:30:38
    information stick to what is true stick
  • 00:30:41
    to what is factual as a netizen you also
  • 00:30:44
    have that responsibility to help keep
  • 00:30:47
    flame wars under control so what do we
  • 00:30:50
    mean by flame wars if you know that two
  • 00:30:52
    people are already fighting online then
  • 00:30:55
    don't add fuel to the fire okay so
  • 00:30:58
    simply put do not engage in something
  • 00:31:00
    that is very unproductive also when you
  • 00:31:03
    are online please do not promote
  • 00:31:05
    divisiveness especially among members of
  • 00:31:09
    the community or members of a particular
  • 00:31:11
    group you also have to respect other
  • 00:31:13
    people's privacy the same way that you
  • 00:31:16
    want them to respect your own having
  • 00:31:18
    access to media information and
  • 00:31:21
    technology is already power like what we
  • 00:31:24
    have mentioned earlier so as someone who
  • 00:31:26
    is in constant use of these advancements
  • 00:31:30
    do not abuse that power be responsible
  • 00:31:34
    be accountable last but not the least be
  • 00:31:36
    forgiving of other people's mistakes
  • 00:31:39
    here are my sources and references for
  • 00:31:41
    this lecture thank you
  • 00:31:48
    you
Tags
  • media literacy
  • digital citizenship
  • intellectual property
  • plagiarism
  • data privacy
  • cyber crime
  • cyberbullying
  • fake news
  • computer addiction
  • digital divide
  • netiquette