SlideShare a Scribd company logo
1 of 25
Media and Information
Literacy
RESPONSIBLE USE OF MEDIA AND
INFORMATION
LEARNING COMPETENCIES
 Discuss responsible use of media and information.
(MIL11/12LESI-IIIg18)
 Explains actions to promote ethical use of media and
information. (MIL11/12LESI-IIIg-22)
 Create reflective understanding to the use of internet
and computers.
Topic Outline
 Responsible use of Media and Information
 Elements of Digital Citizenship
 Rules of Netiquette
 Key questions to real-life experience on ethical use of media
 Activity
Analyzing netiquette rules and reflect on actual experience
CURRENT EVENTS
Suspek sa Pagpatay sa Isang Siklista, Binigyan ng MPD Ng
Hanggang 5 p.m. Para Sumuko
Published on Jul 27, 2016
by YouTube Channel: GMA News and Current Affairs
VIDEOSSuspek sa pagpatay sa isang siklista, binigyan ng
MPD ng hanggang 5 p.m. para sumuko.mp4
CLASS ACTIVITY: ANALYSIS OF EVENT
IMPACT OF SOCIAL MEDIA
 The video of the shooting incident became viral after it was shared by Top
Gear Philippines on Facebook.
 Top Gear wrongfully accused Mr. Nestor Punzalan as the suspect in the
shooting incident.
 Mr. Nestor Punzalan and his wife deactivated their Facebook accounts
after receiving bashings and death threats. Mr. Punzalan even went to the
police to clear his name.
 Undeniably, social media was also instrumental in the arrest of the “real
suspect” Vhon Tanto.
What problem/s were you
encountered with the use of
media?
RECITATION
How do you see the effect of
social media to teenagers
today?
RECITATION
How will you define a
“Responsible Media User”?
RECITATION
ANALYZING INFOGRAPHICS
10 Rules of Netiquette
 Rule 1: Remember the Human
 Rule 2: Adhere to the same standards of behavior online that you follow in real life.
 Rule 3: Know where you are in cyberspace.
 Rule 4: Respect other people's time and bandwidth.
 Rule 5: Make yourself look good online.
 Rule 6: Share expert knowledge.
 Rule 7: Help keep flame wars under control.
 Rule 8: Respect other people's privacy
 Rule 9: Don't abuse your power
 Rule 10: Be forgiving of other people's mistakes
REMEMBER THE HUMAN
RULE # 1
Adhere to the same
standards of behavior
online that you follow in
real life.
RULE # 2
Know where you are in
cyberspace.
RULE # 3
Respect other people's
time and bandwidth.
RULE # 4
Make yourself look good
online.
RULE # 5
Share expert knowledge.
RULE # 6
Help keep flame wars
under control.
RULE # 7
Help keep flame wars
under control.
RULE # 8
Don't abuse your power.
RULE # 9
Be forgiving of other
people's mistakes.
RULE # 10
Applying Learning
Give one (1) digital issue in the Philippines
that resulted from improper online conduct,
discuss the problem and suggest solutions
to address it. Discuss it in 5 sentences. Write
it in a sheet of paper and share your
thoughts in front of the class.
Use the format below to properly
arrange your insights.
A. Digital Issue
- Must be based on facts with reference
B. Problems arise
- Includes effects caused by the issue
C. Solution
- Includes your recommendation to resolve the problem
References:
 Media and Information Literacy Curriculum Guide by DepEd
Photo Credits
 https://www.pinterest.ph/pin/218354281917321230/
 https://digc5110poe.wordpress.com/2016/05/21/nine-elements-of-digital-
citizenship/
ASSIGNMENT:
Fill the
information
inside the
table.

More Related Content

Similar to MIL-Q1-Mod-3 (1).pptx

Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2
opiedog1
 
SPI101_WEEK-3-4_Computer-Ethics.ppsx
SPI101_WEEK-3-4_Computer-Ethics.ppsxSPI101_WEEK-3-4_Computer-Ethics.ppsx
SPI101_WEEK-3-4_Computer-Ethics.ppsx
ozaixyzo
 
Heights of Inhumanity in Cyberspace
Heights of Inhumanity in CyberspaceHeights of Inhumanity in Cyberspace
Heights of Inhumanity in Cyberspace
ijtsrd
 
Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx
 Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx
Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx
arnit1
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
victoriahoo
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
victoriahoo
 

Similar to MIL-Q1-Mod-3 (1).pptx (20)

Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2
 
SPI101_WEEK-3-4_Computer-Ethics.ppsx
SPI101_WEEK-3-4_Computer-Ethics.ppsxSPI101_WEEK-3-4_Computer-Ethics.ppsx
SPI101_WEEK-3-4_Computer-Ethics.ppsx
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
Heights of Inhumanity in Cyberspace
Heights of Inhumanity in CyberspaceHeights of Inhumanity in Cyberspace
Heights of Inhumanity in Cyberspace
 
Singapore's regulation of cybercrime
Singapore's regulation of cybercrimeSingapore's regulation of cybercrime
Singapore's regulation of cybercrime
 
Compass Ky
Compass KyCompass Ky
Compass Ky
 
Digital Tattoo: for MOSAIC
Digital Tattoo: for MOSAICDigital Tattoo: for MOSAIC
Digital Tattoo: for MOSAIC
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education Campaign
 
A Parent's Guide to Understanding Social Media
A Parent's Guide to Understanding Social Media A Parent's Guide to Understanding Social Media
A Parent's Guide to Understanding Social Media
 
5 BS Facts About Data Privacy Everyone Thinks Are True
5 BS Facts About Data Privacy Everyone Thinks Are True5 BS Facts About Data Privacy Everyone Thinks Are True
5 BS Facts About Data Privacy Everyone Thinks Are True
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 B
 
Jacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o scriptJacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o script
 
Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx
 Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx
Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activities
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERA
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
 

Recently uploaded

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 

MIL-Q1-Mod-3 (1).pptx

  • 1. Media and Information Literacy RESPONSIBLE USE OF MEDIA AND INFORMATION
  • 2. LEARNING COMPETENCIES  Discuss responsible use of media and information. (MIL11/12LESI-IIIg18)  Explains actions to promote ethical use of media and information. (MIL11/12LESI-IIIg-22)  Create reflective understanding to the use of internet and computers.
  • 3. Topic Outline  Responsible use of Media and Information  Elements of Digital Citizenship  Rules of Netiquette  Key questions to real-life experience on ethical use of media  Activity Analyzing netiquette rules and reflect on actual experience
  • 4. CURRENT EVENTS Suspek sa Pagpatay sa Isang Siklista, Binigyan ng MPD Ng Hanggang 5 p.m. Para Sumuko Published on Jul 27, 2016 by YouTube Channel: GMA News and Current Affairs VIDEOSSuspek sa pagpatay sa isang siklista, binigyan ng MPD ng hanggang 5 p.m. para sumuko.mp4
  • 5. CLASS ACTIVITY: ANALYSIS OF EVENT IMPACT OF SOCIAL MEDIA  The video of the shooting incident became viral after it was shared by Top Gear Philippines on Facebook.  Top Gear wrongfully accused Mr. Nestor Punzalan as the suspect in the shooting incident.  Mr. Nestor Punzalan and his wife deactivated their Facebook accounts after receiving bashings and death threats. Mr. Punzalan even went to the police to clear his name.  Undeniably, social media was also instrumental in the arrest of the “real suspect” Vhon Tanto.
  • 6. What problem/s were you encountered with the use of media? RECITATION
  • 7. How do you see the effect of social media to teenagers today? RECITATION
  • 8. How will you define a “Responsible Media User”? RECITATION
  • 10.
  • 11. 10 Rules of Netiquette  Rule 1: Remember the Human  Rule 2: Adhere to the same standards of behavior online that you follow in real life.  Rule 3: Know where you are in cyberspace.  Rule 4: Respect other people's time and bandwidth.  Rule 5: Make yourself look good online.  Rule 6: Share expert knowledge.  Rule 7: Help keep flame wars under control.  Rule 8: Respect other people's privacy  Rule 9: Don't abuse your power  Rule 10: Be forgiving of other people's mistakes
  • 13. Adhere to the same standards of behavior online that you follow in real life. RULE # 2
  • 14. Know where you are in cyberspace. RULE # 3
  • 15. Respect other people's time and bandwidth. RULE # 4
  • 16. Make yourself look good online. RULE # 5
  • 18. Help keep flame wars under control. RULE # 7
  • 19. Help keep flame wars under control. RULE # 8
  • 20. Don't abuse your power. RULE # 9
  • 21. Be forgiving of other people's mistakes. RULE # 10
  • 22. Applying Learning Give one (1) digital issue in the Philippines that resulted from improper online conduct, discuss the problem and suggest solutions to address it. Discuss it in 5 sentences. Write it in a sheet of paper and share your thoughts in front of the class.
  • 23. Use the format below to properly arrange your insights. A. Digital Issue - Must be based on facts with reference B. Problems arise - Includes effects caused by the issue C. Solution - Includes your recommendation to resolve the problem
  • 24. References:  Media and Information Literacy Curriculum Guide by DepEd Photo Credits  https://www.pinterest.ph/pin/218354281917321230/  https://digc5110poe.wordpress.com/2016/05/21/nine-elements-of-digital- citizenship/

Editor's Notes

  1. Digital citizenship also includes Digital Etiquette which pertains to electronic standards of conduct or procedures and has to do with the process of thinking about others when using digital devices. Recognizing Online Proper conduct is a must and it has something to do with “Netiquette”.
  2.  Never forget that the person reading your mail or posting is, indeed, a person, with feelings that can be hurt.  Remember the golden rule “Do unto others as you’d have others do unto you”.
  3.  Be ethical.  Breaking the law is bad etiquette. Do your best to act within the laws of society and cyberspace.
  4.  Netiquette varies from domain to domain. Remember that what may perfectly acceptable in one area may be dreadfully rude in another.  Lurk before you leap. When you enter a domain of cyberspace that’s new to you, take a look around. Spend a while listening to the chat or reading the archives. Get a sense of how the people who are already there act. Then go ahead and participate.
  5.  Don’t waste expert reader’s time by posting basic information.  It’s Ok to think that what you’re doing at the moment is the most important thing in the universe, but don’t expect anyone else to agree with you.
  6.  Check grammar and spelling before you post.  Know what you’re talking about and make sense.  Don’t post flame- bait.
  7.  Offer answers and help to people who ask questions on discussion groups.  If you’ve received email answers to a posted question, summarize them and post the summary to the discussion group.
  8.  Don’t respond to flame-bait.  Don’t post spelling or grammar flames.  If you’ve posted flame-bait or perpetuated a flame war, apologize.
  9.  Don’t read other people’s private email.
  10.  The more power you have, the more important it is that you use it well.
  11.  Everyone was a network newbie once.  When someone makes mistake- whether it’s a spelling error or spelling flame or an unnecessary long answer- be kind about it.  Give people the benefit of the doubt; assume they just don’t know any better. And never be arrogant or self-righteous about it.