SlideShare a Scribd company logo
1 of 32
Download to read offline
GROUP 9
MEDIA AND
INFORMATION
LITERACY 12
Legal, Ethical and societal, issues in media
and information
republic act no. 10175
republic act no. 10175
Cybercrime prevention of 2012
Is a law in the Philippines approved on September 12, 2012, which aims to
address legal issues concerning online interactions and the Internet.
Among the cybercrime offenses included in the bill are cybersquatting,
cybersex, child pornography, identity theft, illegal access to data and
libel.
what is cyber?
cyber
- relating to, or involving
computer or computer (such as
the internet)
cyberspace
refers to the virtual computer, and world
specifically, it is an electronic used to form
a global computer network to facilitate
communication
cybercrime
refers to the criminal
activities carried out by
means of computers or
internet
cyberbullying
the use of electronic communication to
bully a person, typically by sending of an
intimidating or threatening nature.
hacking
refers to the practice of modifying or
altering computer and hardware to
accomplish a goal that is considered to be
outside of the creator's original objective.
those individuals who engage in computer
activities are referred to as "hackers".
phishing
is the attempt to obtain sensitive such as
usernames, passwords, and credit card
details, often for malicious reasons by
disguising as a trustworthy entity in a
electronic communication.
illegal downloading
refers to obtaining files
that you do not have the
right to use from the
internet.
Digital Piracy
the practice of ilegally
copying and selling digital
music, video, software, etc.
identity theft
is the delibrate use of someone else's identity, usually
as a method to gain a financial advantage or obtain
credit and other benefit in the other person's name,
and perhaps to other person's disadvantages or loss
cyber defamation
is an unprivileged false statement of fact
which tenda to harm the reputation of a
person or company.
2 types of cyber defamation
1. libel-written
2. slander-verbal
cybersex
also called computer sex, internet sex, netsex
is a virtual sex encounter in which two or more people
(connected via internet) send each other sexually
explicit content or sexually explicit act.
child pornography
is a form of child sexually exploitation
cybersquatting
is registering, trafficking in, or using an
internet domain name with bad faith
intent to profit from the goodwill of a
trademark belonging to someone else.
plagiarism
an act or instance of using or closely
imitating the language and thoughts of
another person without authorization; the
representation of that autho 's work as one's
, as by not's crediting the originak author
2 types of plagiarism
"Sources Not Cited"
1. The Ghost Writer-The writer turns in another's work, word-for-word, as his or her own.
2. The Photocopy- The writer copies significant portions of text straight from a single source,
without alteration.
3. The Potluck Paper- The writer copies from different sources and alters the sentences to
make them fit together while retaining most of the original phrasing.
4. The Poor Disguise- The writer has altered the paper's appearance slightly by changing
keywords and phrases.
5. The Labor of Laziness - The writer takes the time to paraphrase most
of the paper from other sources and make it all fit together.
6. The Self-Stealer- The writer "borrows" generously from his or her previous work.
2 types of plagiarism
"sources Not Cited (But still plagiarized)"
1. The Forgotten Footnote - The writer mentions an author's name for a source,
but neglects to include specific information on the location of the material
referenced.
2. The Misinformer - The writer provides inaccurate information regarding the sources, making
it impossible to find them.
3. The Too-Perfect Paraphrase - The writer properly cites a source but neglects to put in
quotation marks on a text that has been copied word-for-word, or close to it.
4. The Resourceful Citer- The writer properly cites all sources, paraphrasing, and using
quotations appropriately. The catch? The paper contains almost no original work!
fair use
is a legal concept that allows the reproduction of
copyrighted material for certain purposes without
obtaining permission and without paying a fee. Purposes
permitting the application of fair use generally include
review, news reporting, teaching, or scholarly research.
computer addiction
the excessive use of computers to the extent that it
interferes with daily life. This excessive use may for
example interfere with work or sleep, result in
problems with social interaction, or affect mood,
relationships and thought processes.
digital divide
an economic inequality between groups in terms of
access to, use of, or knowledge of ICT. The divide within
countries can refer to inequalities between
individuals, households, businesses, and geographic
areas at different socioeconomic (and other
demographic) levels
virtual self
The persona you create about
yourself virtually
intellectual property (Ip)
refers to creations of the mind, such as
inventions; literary and artistic
works designs and symbols, names, and
images used in commerce
copyright
types of intellectual property
a legal device that gives the creator of a literary, artistic,
musical, or other creative work the sole right to publish and
sell that work.
Copyright owners have the right to control the reproduction
of their work, including the right to receive payment for that
reproduction.
Violation of a copyright is called infringement.
netiquette
the correct or acceptable way
of communicating on the
Internet.
10 rules of netiquette
Rule 1: Remember the Human
Rule 2: Adhere to the same standards behavior
online that you follow in real life of
Rule 3: Know where you are in cyberspace
Rule 4: Respect other people's time and bandwidth
Rule 5: Make yourself look good online
10 rules of netiquette
Rule 6: Share expert knowledge
Rule 7: Help keep flame wars under control
Rule 8: Respect other people's privacy
Rule 9: Don't abuse your power
Rule 10: Be forgiving of other people's
mistakes
DOES ANYONE
HAVE QUESTIONS?
THANK
YOU

More Related Content

What's hot

Contextualized online search and research skill
Contextualized online search and research skillContextualized online search and research skill
Contextualized online search and research skillAngela Giva
 
The advantages and disadvantages of the social network
The advantages and disadvantages of the social networkThe advantages and disadvantages of the social network
The advantages and disadvantages of the social networkLy Saroth
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsJohnBarsaga
 
Lesson 21 Multimedia and ICT.pdf
Lesson 21 Multimedia and ICT.pdfLesson 21 Multimedia and ICT.pdf
Lesson 21 Multimedia and ICT.pdfVicenteCarandang
 
Power of social media
Power of social mediaPower of social media
Power of social mediakaramnav
 
nature and purposes of online platforms and application
nature and purposes of online platforms and applicationnature and purposes of online platforms and application
nature and purposes of online platforms and applicationJohairaAbo
 
mil Elements and Principles.pdf
mil  Elements and Principles.pdfmil  Elements and Principles.pdf
mil Elements and Principles.pdfMagdaLo1
 
E-TECH Q2 Week 1 - Module 12 (1).pptx
E-TECH Q2 Week 1 - Module 12 (1).pptxE-TECH Q2 Week 1 - Module 12 (1).pptx
E-TECH Q2 Week 1 - Module 12 (1).pptxJohn Carlo Rollon
 
Electronic Quiz Bee Empowerment Technology
Electronic Quiz Bee Empowerment TechnologyElectronic Quiz Bee Empowerment Technology
Electronic Quiz Bee Empowerment TechnologyColdShiBbuing
 
presentation on internet (power point presentation)
presentation on internet (power point presentation)presentation on internet (power point presentation)
presentation on internet (power point presentation)shaloof shaan
 
12 Publishing and Sustaining for ICT Project
12 Publishing and Sustaining for ICT Project12 Publishing and Sustaining for ICT Project
12 Publishing and Sustaining for ICT ProjectTeodoro Llanes II
 
The role of social media in our personal life
The role of social media in our personal lifeThe role of social media in our personal life
The role of social media in our personal lifeArnob Khan
 
Can excessive use of social media lead to mental illness
Can excessive use of social media lead to mental illnessCan excessive use of social media lead to mental illness
Can excessive use of social media lead to mental illnessHarsh Vardhan
 
Online Platforms for ICT Content Development
Online Platforms for ICT Content DevelopmentOnline Platforms for ICT Content Development
Online Platforms for ICT Content DevelopmentShara Gerona
 
IMPACT OF SOCIAL MEDIA ON VARIOUS FIELDS
IMPACT OF SOCIAL MEDIA ON VARIOUS FIELDSIMPACT OF SOCIAL MEDIA ON VARIOUS FIELDS
IMPACT OF SOCIAL MEDIA ON VARIOUS FIELDSRupa Bhowmik
 
2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and EtiquetteTeodoro Llanes II
 
Contextualized online search and research skills
Contextualized online search and research skillsContextualized online search and research skills
Contextualized online search and research skillsJonathan Jr Marcelino
 

What's hot (20)

Contextualized online search and research skill
Contextualized online search and research skillContextualized online search and research skill
Contextualized online search and research skill
 
social network
social networksocial network
social network
 
The advantages and disadvantages of the social network
The advantages and disadvantages of the social networkThe advantages and disadvantages of the social network
The advantages and disadvantages of the social network
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skills
 
Lesson 21 Multimedia and ICT.pdf
Lesson 21 Multimedia and ICT.pdfLesson 21 Multimedia and ICT.pdf
Lesson 21 Multimedia and ICT.pdf
 
Power of social media
Power of social mediaPower of social media
Power of social media
 
nature and purposes of online platforms and application
nature and purposes of online platforms and applicationnature and purposes of online platforms and application
nature and purposes of online platforms and application
 
mil Elements and Principles.pdf
mil  Elements and Principles.pdfmil  Elements and Principles.pdf
mil Elements and Principles.pdf
 
E-TECH Q2 Week 1 - Module 12 (1).pptx
E-TECH Q2 Week 1 - Module 12 (1).pptxE-TECH Q2 Week 1 - Module 12 (1).pptx
E-TECH Q2 Week 1 - Module 12 (1).pptx
 
9 Interactive Multimedia
9 Interactive Multimedia9 Interactive Multimedia
9 Interactive Multimedia
 
Electronic Quiz Bee Empowerment Technology
Electronic Quiz Bee Empowerment TechnologyElectronic Quiz Bee Empowerment Technology
Electronic Quiz Bee Empowerment Technology
 
presentation on internet (power point presentation)
presentation on internet (power point presentation)presentation on internet (power point presentation)
presentation on internet (power point presentation)
 
12 Publishing and Sustaining for ICT Project
12 Publishing and Sustaining for ICT Project12 Publishing and Sustaining for ICT Project
12 Publishing and Sustaining for ICT Project
 
The role of social media in our personal life
The role of social media in our personal lifeThe role of social media in our personal life
The role of social media in our personal life
 
Can excessive use of social media lead to mental illness
Can excessive use of social media lead to mental illnessCan excessive use of social media lead to mental illness
Can excessive use of social media lead to mental illness
 
Online Platforms for ICT Content Development
Online Platforms for ICT Content DevelopmentOnline Platforms for ICT Content Development
Online Platforms for ICT Content Development
 
Massive Open Online Course (MOOC)
Massive Open Online Course (MOOC)Massive Open Online Course (MOOC)
Massive Open Online Course (MOOC)
 
IMPACT OF SOCIAL MEDIA ON VARIOUS FIELDS
IMPACT OF SOCIAL MEDIA ON VARIOUS FIELDSIMPACT OF SOCIAL MEDIA ON VARIOUS FIELDS
IMPACT OF SOCIAL MEDIA ON VARIOUS FIELDS
 
2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and Etiquette
 
Contextualized online search and research skills
Contextualized online search and research skillsContextualized online search and research skills
Contextualized online search and research skills
 

Similar to MIL reportings (GROUP 9).pdf

LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfRegineManuel2
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Mark Jhon Oxillo
 
Legal, Ethical, and Societal Issues of Media and Information
Legal, Ethical, and Societal Issues of Media and InformationLegal, Ethical, and Societal Issues of Media and Information
Legal, Ethical, and Societal Issues of Media and InformationJhoelKenneth
 
7-l-e-s-i-m-i-170730072409 (1).pptx
7-l-e-s-i-m-i-170730072409 (1).pptx7-l-e-s-i-m-i-170730072409 (1).pptx
7-l-e-s-i-m-i-170730072409 (1).pptxMARSTONGLENNTUGAHAN
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Media and information literacy ethics-5.pptx
Media and information literacy ethics-5.pptxMedia and information literacy ethics-5.pptx
Media and information literacy ethics-5.pptxRobertCarreonBula
 
Ethical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfEthical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfDesireDelosSantos
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldAmae OlFato
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ictcyb1337
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slidesthothakhail
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber CrimeNithin Raj
 

Similar to MIL reportings (GROUP 9).pdf (20)

Chapter 7
Chapter 7Chapter 7
Chapter 7
 
lesson 7.pptx
lesson 7.pptxlesson 7.pptx
lesson 7.pptx
 
MIL MODULE 03.pptx
MIL MODULE 03.pptxMIL MODULE 03.pptx
MIL MODULE 03.pptx
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
 
Legal, Ethical, and Societal Issues of Media and Information
Legal, Ethical, and Societal Issues of Media and InformationLegal, Ethical, and Societal Issues of Media and Information
Legal, Ethical, and Societal Issues of Media and Information
 
7-l-e-s-i-m-i-170730072409 (1).pptx
7-l-e-s-i-m-i-170730072409 (1).pptx7-l-e-s-i-m-i-170730072409 (1).pptx
7-l-e-s-i-m-i-170730072409 (1).pptx
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Media and information literacy ethics-5.pptx
Media and information literacy ethics-5.pptxMedia and information literacy ethics-5.pptx
Media and information literacy ethics-5.pptx
 
Ethical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfEthical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology Presentatiopdf
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethical dilemma
Ethical dilemmaEthical dilemma
Ethical dilemma
 
Chapter 8.legal. opportunities
Chapter 8.legal. opportunitiesChapter 8.legal. opportunities
Chapter 8.legal. opportunities
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber Crime
 
IPR & CYBER SECURITY.pptx
IPR & CYBER SECURITY.pptxIPR & CYBER SECURITY.pptx
IPR & CYBER SECURITY.pptx
 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

MIL reportings (GROUP 9).pdf

  • 2. Legal, Ethical and societal, issues in media and information
  • 4. republic act no. 10175 Cybercrime prevention of 2012 Is a law in the Philippines approved on September 12, 2012, which aims to address legal issues concerning online interactions and the Internet. Among the cybercrime offenses included in the bill are cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel.
  • 6. cyber - relating to, or involving computer or computer (such as the internet)
  • 7. cyberspace refers to the virtual computer, and world specifically, it is an electronic used to form a global computer network to facilitate communication
  • 8. cybercrime refers to the criminal activities carried out by means of computers or internet
  • 9. cyberbullying the use of electronic communication to bully a person, typically by sending of an intimidating or threatening nature.
  • 10. hacking refers to the practice of modifying or altering computer and hardware to accomplish a goal that is considered to be outside of the creator's original objective. those individuals who engage in computer activities are referred to as "hackers".
  • 11. phishing is the attempt to obtain sensitive such as usernames, passwords, and credit card details, often for malicious reasons by disguising as a trustworthy entity in a electronic communication.
  • 12. illegal downloading refers to obtaining files that you do not have the right to use from the internet.
  • 13. Digital Piracy the practice of ilegally copying and selling digital music, video, software, etc.
  • 14. identity theft is the delibrate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefit in the other person's name, and perhaps to other person's disadvantages or loss
  • 15. cyber defamation is an unprivileged false statement of fact which tenda to harm the reputation of a person or company. 2 types of cyber defamation 1. libel-written 2. slander-verbal
  • 16. cybersex also called computer sex, internet sex, netsex is a virtual sex encounter in which two or more people (connected via internet) send each other sexually explicit content or sexually explicit act.
  • 17. child pornography is a form of child sexually exploitation
  • 18. cybersquatting is registering, trafficking in, or using an internet domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else.
  • 19. plagiarism an act or instance of using or closely imitating the language and thoughts of another person without authorization; the representation of that autho 's work as one's , as by not's crediting the originak author
  • 20. 2 types of plagiarism "Sources Not Cited" 1. The Ghost Writer-The writer turns in another's work, word-for-word, as his or her own. 2. The Photocopy- The writer copies significant portions of text straight from a single source, without alteration. 3. The Potluck Paper- The writer copies from different sources and alters the sentences to make them fit together while retaining most of the original phrasing. 4. The Poor Disguise- The writer has altered the paper's appearance slightly by changing keywords and phrases. 5. The Labor of Laziness - The writer takes the time to paraphrase most of the paper from other sources and make it all fit together. 6. The Self-Stealer- The writer "borrows" generously from his or her previous work.
  • 21. 2 types of plagiarism "sources Not Cited (But still plagiarized)" 1. The Forgotten Footnote - The writer mentions an author's name for a source, but neglects to include specific information on the location of the material referenced. 2. The Misinformer - The writer provides inaccurate information regarding the sources, making it impossible to find them. 3. The Too-Perfect Paraphrase - The writer properly cites a source but neglects to put in quotation marks on a text that has been copied word-for-word, or close to it. 4. The Resourceful Citer- The writer properly cites all sources, paraphrasing, and using quotations appropriately. The catch? The paper contains almost no original work!
  • 22. fair use is a legal concept that allows the reproduction of copyrighted material for certain purposes without obtaining permission and without paying a fee. Purposes permitting the application of fair use generally include review, news reporting, teaching, or scholarly research.
  • 23. computer addiction the excessive use of computers to the extent that it interferes with daily life. This excessive use may for example interfere with work or sleep, result in problems with social interaction, or affect mood, relationships and thought processes.
  • 24. digital divide an economic inequality between groups in terms of access to, use of, or knowledge of ICT. The divide within countries can refer to inequalities between individuals, households, businesses, and geographic areas at different socioeconomic (and other demographic) levels
  • 25. virtual self The persona you create about yourself virtually
  • 26. intellectual property (Ip) refers to creations of the mind, such as inventions; literary and artistic works designs and symbols, names, and images used in commerce
  • 27. copyright types of intellectual property a legal device that gives the creator of a literary, artistic, musical, or other creative work the sole right to publish and sell that work. Copyright owners have the right to control the reproduction of their work, including the right to receive payment for that reproduction. Violation of a copyright is called infringement.
  • 28. netiquette the correct or acceptable way of communicating on the Internet.
  • 29. 10 rules of netiquette Rule 1: Remember the Human Rule 2: Adhere to the same standards behavior online that you follow in real life of Rule 3: Know where you are in cyberspace Rule 4: Respect other people's time and bandwidth Rule 5: Make yourself look good online
  • 30. 10 rules of netiquette Rule 6: Share expert knowledge Rule 7: Help keep flame wars under control Rule 8: Respect other people's privacy Rule 9: Don't abuse your power Rule 10: Be forgiving of other people's mistakes