SlideShare a Scribd company logo
1 of 103
Download to read offline
LEGAL, ETHICAL AND
SOCIETAL ISSUES IN
MEDIA AND
INFORMATION
PRESENTED BY: SIASON, MONCHING
COPY
RIGHT/FAIR
USE/
PLAGIARISM
Points to discuss:
COPY RIGHT
FAIR USE
PLAGIARISM
CYBERCRIME
HACKING
PHISHING
ETC.
REPUBLIC ACT
NO.10175
Republic Act No. 10175
- Or the Cybercrime Prevention Act of 2012
- Is a law in the Philippines approved on
September 12, 2012 which aims to address the
legal issues concerning online interaction and
the internet.
Among the Cybercrime offenses included in the
bill are cybersquatting, Child pornography,
Identify theft, illegal downloading and cybersex.
COPYRIGHT
-A legal device that gives the creator of a
literary, artistic, musical , or other
creative work the sole right to publish
and sell that work.
FAIR USE
- Is a legal concept that allows the
reproduction of copyrighted material for
certain purposes without obtaining
permission and without paying a fee.
PLAGIARISM
-An act or instance of using or closely
imitating the language and thoughts of
another author without authorization. The
representation of that author's work as
one's own, as by not crediting the original
author.
CYBERCRIME
-Refers to the criminal activities carried
out by means of computers or the
internet.
HACKING
- Refers to the practice of modifying or
altering computer software and hardware
to accomplish a goal that is considered
to be outside of the creator's original
objective.
PHISHING
-Is the attempt to obtain sensitive
information such as usernames,
passwords and credit card details,
Often for malicious reasons, by
disguising as a trustworthy entity in an
electronic communication.
ILLEGAL
DOWNLOADING
-Refers to obtaining files that you do not
have the right to use from the internet.
DIGITAL PIRACY
-The practice of illegally copying and
selling digital music, video, computer
software, etc.
IDENTITY THEFT
-Is the deliberate use of someone else's
identity, usually as a method to gain a
financial advantage or obtain credits and
often benefits in the other person's name,
and perhaps to the other person's
disadvantage or loss.
CYBER
DEFAMATION
-Is an unprivileged false statement of
fact which tends to harm the reputation
of a person or company.
2 types of Defamation:
1. Libel - Written
2. Slander- Verbal
CYBERSEX
-Also called computer sex, Internet sex
or net sex.
-Is a virtual sex encounter in which two or
more people (connected via internet)
send each other sexually explicit
contents or sexually explicit acts.
CHILD
PORNOGRAPHY
-Is a form of child sexual exploitation.
CYBERSQUATING
-Is registering, trafficking in, or using an
internet domain name with bad faith
intent to profit from the goodwill of a
trademark belonging to someone else.
NETIQUETTE
PRESENTED BY: BANDOJO, CHRISTIAN
NETIQUETTE IS A MADE-UP WORD FROM
THE WORDS NET AND ETIQUETTE.
NETIQUETTE THUS DESCRIBES THE RULES
OF CONDUCT FOR RESPECTFUL AND
APPROPRIATE COMMUNICATION ON THE
INTERNET. THE RULES OF NETIQUETTE
VERY DEPENDING ON THE PLATFORM
AND ITS PARTICIPANTS . WHEN
COMMUNICATING ON THE INTERNET,
YOU SHOULD ALWAYS REMEMBER THAT
YOU ARE COMMUNICATING WITH PEOPLE
AND NOT SIMPLY WITH COMPUTERS OR
SMARTPHONES.
5 general recommendations for conduct on the internet.
1. Stick to the rules of conduct online that you follow in
real life.
*Respect the opinions of your chat counterparts and
express constructive criticism.
2. Netiquette: Think of the person.
*You are not communicating with a machine, but with
real people.
3. Present your best side online.
*Good netiquette is characterized by respect,
politeness and professionalism.
4. Read first, then ask.
*Remember that conversations online can happen very
quickly. It is therefore important to gather all the
information before responding or asking questions.
5. Netiquette: Pay attention to grammar and
punctuation.
*Grammar, spelling and punctuation become especially
important when composing emails or other
correspondence that you submit to colleagues or
superiors.
1
2
3
EXAMPLES OF NETIQUETTE:
*KEEP THE GOOD EDUCATION. ...
*RESPECT EACH OTHER'S BANDWIDTH.
...
*DON'T SEND PICTURES OR VIDEOS OF
OTHER PEOPLE,ESPECIALLY IF THEY'RE
INTIMATE. ...
*ALSO, DO NOT DISSEMINATE PRIVATE
INFORMATION ABOUT YOURSELF OR
OTHERS.
1
2
3
THE RULES TO FOLLOW FOR GOOD NETIQUETTE:
1. AVOID POSTING INFLAMMATORY OR OFFENSIVE
COMMENTS ONLINE.
2. RESPECT OTHERS' PRIVACY BY NOT SHARING
PERSONAL INFORMATION, PHOTOS, OR VIDEOS THAT
ANOTHER PERSON MAY NOT WANT PUBLISHED
ONLINE.
3. NEVER SPAM OTHERS BY SENDING LARGE
AMOUNTS OF UNSOLICITED EMAIL.
4. SHOW GOOD SPORTSMANSHIP WHEN PLAYING
ONLINE GAMES, WHETHER YOU WIN OR LOSE.
5. DON'T TROLL PEOPLE IN WEB FORUMS OR
WEBSITE COMMENTS BY REPEATEDLY NAGGING OR
ANNOYING THEM.
1
2
3
DIGITAL DIVIDE,
ADDICTION AND
BULLYING
PRESENTED BY: FERMIZA, KRISTINE
DIGITAL DIVIDE
THE DIGITAL DIVIDE IS A TERM
THAT REFERS TO THE GAP
BETWEEN DEMOGRAPHICS AND
REGIONS THAT HAVE ACCESS TO
MODERN INFORMATION AND
COMMUNICATIONS TECHNOLOGY
(ICT), AND THOSE THAT DON'T
HAVE RESTRICTED ACCESS. THIS
TECHNOLOGY CAN INCLUDE THE
TELEPHONE, TELEVISION,
PERSONAL COMPUTERS , AND
INTERNET CONNECTIVITY.
SOCIAL MEDIA | QUARTERLY REPORT
THERE ARE FOUR(4) CONDITIONS
THAT WE ARE GOING TO USE THE
INTERNET ACCESS.
1.KNOWLEDGE
2.GADGETS
3.MONEY
4.SKILLS
SOCIAL MEDIA | QUARTERLY REPORT DECEMBER 2020
1.GENDER DIGITAL
📍 GENDER IS DEFINED AS GENDER
BIASES CODED INTO TECHNOLOGY
PRODUCTS, TECHNOLOGY SECTOR
AND DIGITAL SKILLS EDUCATION.
2.SOCIAL DIVIDE
📍THERE IS NO FAIR LEARNING
ACCESS IN THE COUNTRY.
3.UNIVERSAL DIVIDE
📍INDIVIDUAL LIVING WITH PHYSICAL
DISABILITIES ARE OFTEN
DISADVANTAGE WHEN IT COMES TO
ACCESSING THE INTERNET.
WITHOUT BROADBRAND ACCESS AND
RELIABLE INTERNET CONNECTIVITY.
PEOPLE HAVE FAR LESS OF AN ABILITY TO
CONNECR WITH OTHERS THAN THE REST
OF THE WORLD.
IMPORTANCE OF
DIGITAL DIVIDE
3 TYPES OF
DIGITAL DIVIDE
COMPUTER
ADDICTION
COMPUTER ADDICTION IS
CHARACTERIZED BY
EXCESSIVE OR POORLY
CONTROLLED
PREOCCUPATIONS, URGES
AND INTERNET ACCESS
THAT LEAD TO
IMPAIRMENT OR DISTRESS.
SOCIAL MEDIA | QUARTERLY REPORT
POSITIVE AND
NEGATIVE
USES OF
COMPUTERS:
SOCIAL MEDIA | QUARTERLY REPORT DECEMBER 2020
📍POSITIVE EFFECT ARE FASTER
COMMUNICATION OR
ORGANIZATION OF DATA AND
INFORMATION.
📍NEGATIVE EFFECT OF
COMPUTERS HUMAN'S BREAK
THEIR SOCIAL INTERACT WITH
FRIENDS AND FAMILIES, CAUSE
BLACK PROBLEM, DEPRESSION ,
AND POOR HEALTH.
TYPES OF
COMPUTER
ADDICTION:
1.CYBERSEX
ADDICTION
2.COMPUTER
GAMING ADDICTION
📍IT IS A KIND OF BULLYING THAT
OCCASIONALLY AROUND US. IT
COULD BE CELLPHONES, TABLETS
, OR OUR PERSONAL COMPUTERS,
AND IT GENERALLY OCCURS
THROUGH TEXT MESSAGING,
SOCIAL MEDIA, OR GAMING
CYBERBULLYING IS BY
TRANSFERRING OR SHARING AND
PARTICIPATING IN NEGATIVE
MEAN, AND FALSE COMMENTARY
ABOUT SOMEONE.
CYBERBULLYING
WHY DO OTHER PEOPLE
CYBERBULLY?
•THEY HAD BEEN VICTIM O
OF CYBER BULLYING
•FOR POWER
•BECAUSE OF BEING JEALOUS
•MIGHT HAVE A DIFFICULT
LIFE AT HOME
WHERE DOES CYBER BULLYING
OCCUR?
1. DIFFERENT SOCILA MEDIA
ACCOUNTS OR APPLICATIONS
2. TEXT MESSAGING
3. ONLINE ROOM WHERE THERE IS
RANDOM CONVERSATION
VIRTUAL SELF
PRESENTED BY: BANDOJO, CHRISTLE
- an artificial environment which is
experience through stimuli ( as
sights and sounds) provided by a
computer and in which one's
actions partially determine what
happens in the environment.
The technogy used to create or access a virtual
reality
- virtual self is the personal you create about
yourself.
virtual self it is also a particles art music video.
What are examples of
virtual self?
- one example of virtual
self is the avatar that
represents.
CURRENT AND
FUTURE TRENDS
OF SOCIAL MEDIA
AND
INFORMATION
PRESENTED BY: CATUBAY, GERSON
MASSIVE OPEN
ONLINE CONTENT
TIKTOK
SOCIAL
COMMERCE
THE
CREATOR
SOCIAL
MEDIA
AUDIO
LIVESTREAM
SHOPPING
SHORT FORM
VIDEOS
MASSIVE
ONLINE
COURSE
VIRTUAL
JOBS
PRESENTED BY: CASTILLO, DENNIS
UBIQUITOUS
LEARNING
Ubiquitous learning can be defined as an
everyday learning environment that is
supported by mobile and embedded
computers and wireless networks in our
everyday life
PRESENTED BY: STO.TOMAS, PAMELA
PEOPLE
MEDIA
•It refers to
persons that are
involved in the
use, analysis,
production and
evaluation of
media and
information.
•PEOPLE AS MEDIA
•PEOPLE IN MEDIA
PEOPLE AS MEDIA
•People who are well-
oriented to media sources and
messages and able to provide
information as accurate and
reliable as possible.
PEOPLE IN MEDIA
•Media practitioners who
provide information
coming from their expert
knowledge or first-hand
experience of event.
04
CHARACTERISTICS
•DIGITAL
•INTERACTIVE
•HYPERTEXTUAL
•NETWORK
•VIRTUAL
•STIMULATED
Digital- any form of media that uses electronic devices for distribution.
Interactive- refers to products and services on digital computer-based
systems which respond to the user's actions by presenting content.
Hypertextuality- allows a large quantity of information to freely move
around within a series of interconnected nodes in the network.
Network- refers to the communication channels used
to interconnect nodes on a computer network.
Virtual- is any type of data storage device — such as CDs,
flash drives, or external hard drives — that you
can connect to remotely to enable data sharing.
Stimulated - it can be defined as “an agency
or influence that stimulates to action or (const. to)
that quickens an activity or process.”
FORMAT OF PEOPLE
MEDIA
PRESENTED BY: ALIANGAN, REYMAR
RELATIONSHIP/SOCIAL NETWORK-
set of people who are connected to each
other through meaningful social
relationship and patterns of interaction.
MICRO BLOGGING- the activity or practice of
making short frequent post to a microblog.
SPECIAL INTEREST NETWORK- promote contact between
regulatory professionals working in the same
specialist sector.
MEDIA SHARING- a social media app. Enable users to create stove
and share their multimedia files, shared media refers to content which
is shared across third party platforms.
TYPES OF
PEOPLE
MEDIA
OPINION LEADERS- is a leader for a certain group who
gives details and information to lesser active persons in the group.
CITIZENS JOURNALIST- people without professional journalism training
that use the tools of modern technology and interact to create argument
of fact check media on their own or in collaboration with others.
SOCIAL JOURNALIST- journalist that uses social media to make
their content available to more people.
CROWDSOURCER- the person who obtains needed service ideas or
content by soliciting contributions from a large group of people and
specially from the online community.
ADVANTAGES
AND
LIMITATIONS
PRESENTED BY: TAHIL, FERWINA
Introduction Flowchart Building
1. Facilitates open communication leading to enhanced information discovery and
delivery.
2. Allows employees to discuss ideas, post ,news ask question and sharelinks.
3. Provides an opportunity to widen business contacts.
4. Improves business reputation and client base with minimal use of advertising.
5. Expands market research, implemants marketing campaign, delivery
communication and direct interested people to specific websites.
ADVANTAGES
LIMITATIONS
- Reliability
- Allow incorect discovery of information
- Time consuming
VALUE OF PEOPLE MEDIA
What is the Value of
People Media?
Without people, there will be no
information available in any kind of
media. People and media should be
considered as equally important
because people create media and
whatever information we have
depends on the kind of expertise a
person have.
What is People Media?
People Media. Refers to
persons that are involved in the
use, analysis, evaluation and
production of media and
information.

More Related Content

Similar to LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf

Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Online-safety-security-ethics-and-etiquette.pdf
Online-safety-security-ethics-and-etiquette.pdfOnline-safety-security-ethics-and-etiquette.pdf
Online-safety-security-ethics-and-etiquette.pdfmarissaramos007
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxSahilMishra81
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxSahilMishra81
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crimeatifkhanniazi
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesRoshelleBonDacara
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERARoshelleBonDacara
 
ICT, the Self, and Society.pdf
ICT, the Self, and Society.pdfICT, the Self, and Society.pdf
ICT, the Self, and Society.pdfTeacherAnneApolinari
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxAnecitaLCalamohoy
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxAnecitaLCalamohoy
 
Disadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDisadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDixsonCaluag2
 
MIL reportings (GROUP 9).pdf
MIL reportings (GROUP 9).pdfMIL reportings (GROUP 9).pdf
MIL reportings (GROUP 9).pdfmariebanghit
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 

Similar to LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf (20)

Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Online-safety-security-ethics-and-etiquette.pdf
Online-safety-security-ethics-and-etiquette.pdfOnline-safety-security-ethics-and-etiquette.pdf
Online-safety-security-ethics-and-etiquette.pdf
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activities
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERA
 
ICT, the Self, and Society.pdf
ICT, the Self, and Society.pdfICT, the Self, and Society.pdf
ICT, the Self, and Society.pdf
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
Disadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDisadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptx
 
MIL reportings (GROUP 9).pdf
MIL reportings (GROUP 9).pdfMIL reportings (GROUP 9).pdf
MIL reportings (GROUP 9).pdf
 
Lesson-7.pptx
Lesson-7.pptxLesson-7.pptx
Lesson-7.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
MIL WEEK 8.pptx
MIL WEEK 8.pptxMIL WEEK 8.pptx
MIL WEEK 8.pptx
 

More from RegineManuel2

TPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptx
TPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptx
TPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptxRegineManuel2
 
Abdulhakim-Mohammad-Al-shariff-Porte-and-connector.pptxAbdulhakim-Mohammad-Al...
Abdulhakim-Mohammad-Al-shariff-Porte-and-connector.pptxAbdulhakim-Mohammad-Al...Abdulhakim-Mohammad-Al-shariff-Porte-and-connector.pptxAbdulhakim-Mohammad-Al...
Abdulhakim-Mohammad-Al-shariff-Porte-and-connector.pptxAbdulhakim-Mohammad-Al...RegineManuel2
 
TYPES-OF-CPU-AND-PROCESSING-UNITS.pptx...
TYPES-OF-CPU-AND-PROCESSING-UNITS.pptx...TYPES-OF-CPU-AND-PROCESSING-UNITS.pptx...
TYPES-OF-CPU-AND-PROCESSING-UNITS.pptx...RegineManuel2
 
TPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK...
TPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK...TPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK...
TPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK...RegineManuel2
 
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxRegineManuel2
 
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...RegineManuel2
 
LESSON 2.pptx ROLES OF TECHNOLOGY FOR TEACHING AND LEARNING
LESSON 2.pptx ROLES OF TECHNOLOGY FOR TEACHING AND LEARNINGLESSON 2.pptx ROLES OF TECHNOLOGY FOR TEACHING AND LEARNING
LESSON 2.pptx ROLES OF TECHNOLOGY FOR TEACHING AND LEARNINGRegineManuel2
 
PED-8-REPORT-group7.-fiPED-8-REPORT-group7.-final.pptxPED-8-REPORT-group7.-fi...
PED-8-REPORT-group7.-fiPED-8-REPORT-group7.-final.pptxPED-8-REPORT-group7.-fi...PED-8-REPORT-group7.-fiPED-8-REPORT-group7.-final.pptxPED-8-REPORT-group7.-fi...
PED-8-REPORT-group7.-fiPED-8-REPORT-group7.-final.pptxPED-8-REPORT-group7.-fi...RegineManuel2
 
EXPANSION-CARD.pptx-ajin-and-aljismer.pptxEXPANSION-CARD.pptx-ajin-and-aljism...
EXPANSION-CARD.pptx-ajin-and-aljismer.pptxEXPANSION-CARD.pptx-ajin-and-aljism...EXPANSION-CARD.pptx-ajin-and-aljismer.pptxEXPANSION-CARD.pptx-ajin-and-aljism...
EXPANSION-CARD.pptx-ajin-and-aljismer.pptxEXPANSION-CARD.pptx-ajin-and-aljism...RegineManuel2
 
Motherboard.pptxMotherboard.ppMotherboard.pptxMotherboard.pptxMotherboard.ppt...
Motherboard.pptxMotherboard.ppMotherboard.pptxMotherboard.pptxMotherboard.ppt...Motherboard.pptxMotherboard.ppMotherboard.pptxMotherboard.pptxMotherboard.ppt...
Motherboard.pptxMotherboard.ppMotherboard.pptxMotherboard.pptxMotherboard.ppt...RegineManuel2
 
ICT-4-TYPES-OF-MODEL-SHEETS.pptx.........
ICT-4-TYPES-OF-MODEL-SHEETS.pptx.........ICT-4-TYPES-OF-MODEL-SHEETS.pptx.........
ICT-4-TYPES-OF-MODEL-SHEETS.pptx.........RegineManuel2
 
Motherboard.pptx...,.......,..............
Motherboard.pptx...,.......,..............Motherboard.pptx...,.......,..............
Motherboard.pptx...,.......,..............RegineManuel2
 
TLE 7-OHS.pptx............................................
TLE 7-OHS.pptx............................................TLE 7-OHS.pptx............................................
TLE 7-OHS.pptx............................................RegineManuel2
 
Technology for Teaching and Lerning 1......
Technology for Teaching and Lerning 1......Technology for Teaching and Lerning 1......
Technology for Teaching and Lerning 1......RegineManuel2
 
Presentation_(2)_(2)_(2).pdf
Presentation_(2)_(2)_(2).pdfPresentation_(2)_(2)_(2).pdf
Presentation_(2)_(2)_(2).pdfRegineManuel2
 

More from RegineManuel2 (16)

TPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptx
TPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptx
TPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptx
 
Abdulhakim-Mohammad-Al-shariff-Porte-and-connector.pptxAbdulhakim-Mohammad-Al...
Abdulhakim-Mohammad-Al-shariff-Porte-and-connector.pptxAbdulhakim-Mohammad-Al...Abdulhakim-Mohammad-Al-shariff-Porte-and-connector.pptxAbdulhakim-Mohammad-Al...
Abdulhakim-Mohammad-Al-shariff-Porte-and-connector.pptxAbdulhakim-Mohammad-Al...
 
TYPES-OF-CPU-AND-PROCESSING-UNITS.pptx...
TYPES-OF-CPU-AND-PROCESSING-UNITS.pptx...TYPES-OF-CPU-AND-PROCESSING-UNITS.pptx...
TYPES-OF-CPU-AND-PROCESSING-UNITS.pptx...
 
TPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK...
TPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK...TPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK...
TPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK...
 
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
 
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
 
LESSON 2.pptx ROLES OF TECHNOLOGY FOR TEACHING AND LEARNING
LESSON 2.pptx ROLES OF TECHNOLOGY FOR TEACHING AND LEARNINGLESSON 2.pptx ROLES OF TECHNOLOGY FOR TEACHING AND LEARNING
LESSON 2.pptx ROLES OF TECHNOLOGY FOR TEACHING AND LEARNING
 
PED-8-REPORT-group7.-fiPED-8-REPORT-group7.-final.pptxPED-8-REPORT-group7.-fi...
PED-8-REPORT-group7.-fiPED-8-REPORT-group7.-final.pptxPED-8-REPORT-group7.-fi...PED-8-REPORT-group7.-fiPED-8-REPORT-group7.-final.pptxPED-8-REPORT-group7.-fi...
PED-8-REPORT-group7.-fiPED-8-REPORT-group7.-final.pptxPED-8-REPORT-group7.-fi...
 
EXPANSION-CARD.pptx-ajin-and-aljismer.pptxEXPANSION-CARD.pptx-ajin-and-aljism...
EXPANSION-CARD.pptx-ajin-and-aljismer.pptxEXPANSION-CARD.pptx-ajin-and-aljism...EXPANSION-CARD.pptx-ajin-and-aljismer.pptxEXPANSION-CARD.pptx-ajin-and-aljism...
EXPANSION-CARD.pptx-ajin-and-aljismer.pptxEXPANSION-CARD.pptx-ajin-and-aljism...
 
Motherboard.pptxMotherboard.ppMotherboard.pptxMotherboard.pptxMotherboard.ppt...
Motherboard.pptxMotherboard.ppMotherboard.pptxMotherboard.pptxMotherboard.ppt...Motherboard.pptxMotherboard.ppMotherboard.pptxMotherboard.pptxMotherboard.ppt...
Motherboard.pptxMotherboard.ppMotherboard.pptxMotherboard.pptxMotherboard.ppt...
 
ICT-4-TYPES-OF-MODEL-SHEETS.pptx.........
ICT-4-TYPES-OF-MODEL-SHEETS.pptx.........ICT-4-TYPES-OF-MODEL-SHEETS.pptx.........
ICT-4-TYPES-OF-MODEL-SHEETS.pptx.........
 
Motherboard.pptx...,.......,..............
Motherboard.pptx...,.......,..............Motherboard.pptx...,.......,..............
Motherboard.pptx...,.......,..............
 
TLE 7-OHS.pptx............................................
TLE 7-OHS.pptx............................................TLE 7-OHS.pptx............................................
TLE 7-OHS.pptx............................................
 
Technology for Teaching and Lerning 1......
Technology for Teaching and Lerning 1......Technology for Teaching and Lerning 1......
Technology for Teaching and Lerning 1......
 
LESSON 2.pptx
LESSON 2.pptxLESSON 2.pptx
LESSON 2.pptx
 
Presentation_(2)_(2)_(2).pdf
Presentation_(2)_(2)_(2).pdfPresentation_(2)_(2)_(2).pdf
Presentation_(2)_(2)_(2).pdf
 

Recently uploaded

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 

Recently uploaded (20)

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 

LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf

  • 1. LEGAL, ETHICAL AND SOCIETAL ISSUES IN MEDIA AND INFORMATION PRESENTED BY: SIASON, MONCHING
  • 2. COPY RIGHT/FAIR USE/ PLAGIARISM Points to discuss: COPY RIGHT FAIR USE PLAGIARISM CYBERCRIME HACKING PHISHING ETC.
  • 3. REPUBLIC ACT NO.10175 Republic Act No. 10175 - Or the Cybercrime Prevention Act of 2012 - Is a law in the Philippines approved on September 12, 2012 which aims to address the legal issues concerning online interaction and the internet. Among the Cybercrime offenses included in the bill are cybersquatting, Child pornography, Identify theft, illegal downloading and cybersex.
  • 4. COPYRIGHT -A legal device that gives the creator of a literary, artistic, musical , or other creative work the sole right to publish and sell that work. FAIR USE - Is a legal concept that allows the reproduction of copyrighted material for certain purposes without obtaining permission and without paying a fee.
  • 5. PLAGIARISM -An act or instance of using or closely imitating the language and thoughts of another author without authorization. The representation of that author's work as one's own, as by not crediting the original author. CYBERCRIME -Refers to the criminal activities carried out by means of computers or the internet.
  • 6. HACKING - Refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator's original objective. PHISHING -Is the attempt to obtain sensitive information such as usernames, passwords and credit card details, Often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
  • 7. ILLEGAL DOWNLOADING -Refers to obtaining files that you do not have the right to use from the internet. DIGITAL PIRACY -The practice of illegally copying and selling digital music, video, computer software, etc.
  • 8. IDENTITY THEFT -Is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credits and often benefits in the other person's name, and perhaps to the other person's disadvantage or loss. CYBER DEFAMATION -Is an unprivileged false statement of fact which tends to harm the reputation of a person or company. 2 types of Defamation: 1. Libel - Written 2. Slander- Verbal
  • 9. CYBERSEX -Also called computer sex, Internet sex or net sex. -Is a virtual sex encounter in which two or more people (connected via internet) send each other sexually explicit contents or sexually explicit acts. CHILD PORNOGRAPHY -Is a form of child sexual exploitation.
  • 10. CYBERSQUATING -Is registering, trafficking in, or using an internet domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else.
  • 12. NETIQUETTE IS A MADE-UP WORD FROM THE WORDS NET AND ETIQUETTE. NETIQUETTE THUS DESCRIBES THE RULES OF CONDUCT FOR RESPECTFUL AND APPROPRIATE COMMUNICATION ON THE INTERNET. THE RULES OF NETIQUETTE VERY DEPENDING ON THE PLATFORM AND ITS PARTICIPANTS . WHEN COMMUNICATING ON THE INTERNET, YOU SHOULD ALWAYS REMEMBER THAT YOU ARE COMMUNICATING WITH PEOPLE AND NOT SIMPLY WITH COMPUTERS OR SMARTPHONES.
  • 13. 5 general recommendations for conduct on the internet. 1. Stick to the rules of conduct online that you follow in real life. *Respect the opinions of your chat counterparts and express constructive criticism. 2. Netiquette: Think of the person. *You are not communicating with a machine, but with real people. 3. Present your best side online. *Good netiquette is characterized by respect, politeness and professionalism. 4. Read first, then ask. *Remember that conversations online can happen very quickly. It is therefore important to gather all the information before responding or asking questions. 5. Netiquette: Pay attention to grammar and punctuation. *Grammar, spelling and punctuation become especially important when composing emails or other correspondence that you submit to colleagues or superiors. 1 2 3
  • 14. EXAMPLES OF NETIQUETTE: *KEEP THE GOOD EDUCATION. ... *RESPECT EACH OTHER'S BANDWIDTH. ... *DON'T SEND PICTURES OR VIDEOS OF OTHER PEOPLE,ESPECIALLY IF THEY'RE INTIMATE. ... *ALSO, DO NOT DISSEMINATE PRIVATE INFORMATION ABOUT YOURSELF OR OTHERS. 1 2 3
  • 15. THE RULES TO FOLLOW FOR GOOD NETIQUETTE: 1. AVOID POSTING INFLAMMATORY OR OFFENSIVE COMMENTS ONLINE. 2. RESPECT OTHERS' PRIVACY BY NOT SHARING PERSONAL INFORMATION, PHOTOS, OR VIDEOS THAT ANOTHER PERSON MAY NOT WANT PUBLISHED ONLINE. 3. NEVER SPAM OTHERS BY SENDING LARGE AMOUNTS OF UNSOLICITED EMAIL. 4. SHOW GOOD SPORTSMANSHIP WHEN PLAYING ONLINE GAMES, WHETHER YOU WIN OR LOSE. 5. DON'T TROLL PEOPLE IN WEB FORUMS OR WEBSITE COMMENTS BY REPEATEDLY NAGGING OR ANNOYING THEM. 1 2 3
  • 17. DIGITAL DIVIDE THE DIGITAL DIVIDE IS A TERM THAT REFERS TO THE GAP BETWEEN DEMOGRAPHICS AND REGIONS THAT HAVE ACCESS TO MODERN INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT), AND THOSE THAT DON'T HAVE RESTRICTED ACCESS. THIS TECHNOLOGY CAN INCLUDE THE TELEPHONE, TELEVISION, PERSONAL COMPUTERS , AND INTERNET CONNECTIVITY. SOCIAL MEDIA | QUARTERLY REPORT
  • 18. THERE ARE FOUR(4) CONDITIONS THAT WE ARE GOING TO USE THE INTERNET ACCESS. 1.KNOWLEDGE 2.GADGETS 3.MONEY 4.SKILLS SOCIAL MEDIA | QUARTERLY REPORT DECEMBER 2020
  • 19. 1.GENDER DIGITAL 📍 GENDER IS DEFINED AS GENDER BIASES CODED INTO TECHNOLOGY PRODUCTS, TECHNOLOGY SECTOR AND DIGITAL SKILLS EDUCATION. 2.SOCIAL DIVIDE 📍THERE IS NO FAIR LEARNING ACCESS IN THE COUNTRY. 3.UNIVERSAL DIVIDE 📍INDIVIDUAL LIVING WITH PHYSICAL DISABILITIES ARE OFTEN DISADVANTAGE WHEN IT COMES TO ACCESSING THE INTERNET. WITHOUT BROADBRAND ACCESS AND RELIABLE INTERNET CONNECTIVITY. PEOPLE HAVE FAR LESS OF AN ABILITY TO CONNECR WITH OTHERS THAN THE REST OF THE WORLD. IMPORTANCE OF DIGITAL DIVIDE 3 TYPES OF DIGITAL DIVIDE
  • 20. COMPUTER ADDICTION COMPUTER ADDICTION IS CHARACTERIZED BY EXCESSIVE OR POORLY CONTROLLED PREOCCUPATIONS, URGES AND INTERNET ACCESS THAT LEAD TO IMPAIRMENT OR DISTRESS. SOCIAL MEDIA | QUARTERLY REPORT
  • 21. POSITIVE AND NEGATIVE USES OF COMPUTERS: SOCIAL MEDIA | QUARTERLY REPORT DECEMBER 2020 📍POSITIVE EFFECT ARE FASTER COMMUNICATION OR ORGANIZATION OF DATA AND INFORMATION. 📍NEGATIVE EFFECT OF COMPUTERS HUMAN'S BREAK THEIR SOCIAL INTERACT WITH FRIENDS AND FAMILIES, CAUSE BLACK PROBLEM, DEPRESSION , AND POOR HEALTH.
  • 23. 📍IT IS A KIND OF BULLYING THAT OCCASIONALLY AROUND US. IT COULD BE CELLPHONES, TABLETS , OR OUR PERSONAL COMPUTERS, AND IT GENERALLY OCCURS THROUGH TEXT MESSAGING, SOCIAL MEDIA, OR GAMING CYBERBULLYING IS BY TRANSFERRING OR SHARING AND PARTICIPATING IN NEGATIVE MEAN, AND FALSE COMMENTARY ABOUT SOMEONE. CYBERBULLYING
  • 24. WHY DO OTHER PEOPLE CYBERBULLY? •THEY HAD BEEN VICTIM O OF CYBER BULLYING •FOR POWER •BECAUSE OF BEING JEALOUS •MIGHT HAVE A DIFFICULT LIFE AT HOME WHERE DOES CYBER BULLYING OCCUR? 1. DIFFERENT SOCILA MEDIA ACCOUNTS OR APPLICATIONS 2. TEXT MESSAGING 3. ONLINE ROOM WHERE THERE IS RANDOM CONVERSATION
  • 25. VIRTUAL SELF PRESENTED BY: BANDOJO, CHRISTLE
  • 26. - an artificial environment which is experience through stimuli ( as sights and sounds) provided by a computer and in which one's actions partially determine what happens in the environment.
  • 27. The technogy used to create or access a virtual reality - virtual self is the personal you create about yourself. virtual self it is also a particles art music video.
  • 28. What are examples of virtual self? - one example of virtual self is the avatar that represents.
  • 29.
  • 30. CURRENT AND FUTURE TRENDS OF SOCIAL MEDIA AND INFORMATION PRESENTED BY: CATUBAY, GERSON
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77. PRESENTED BY: CASTILLO, DENNIS UBIQUITOUS LEARNING
  • 78. Ubiquitous learning can be defined as an everyday learning environment that is supported by mobile and embedded computers and wireless networks in our everyday life
  • 79. PRESENTED BY: STO.TOMAS, PAMELA PEOPLE MEDIA
  • 80. •It refers to persons that are involved in the use, analysis, production and evaluation of media and information.
  • 82. PEOPLE AS MEDIA •People who are well- oriented to media sources and messages and able to provide information as accurate and reliable as possible.
  • 83.
  • 84.
  • 85. PEOPLE IN MEDIA •Media practitioners who provide information coming from their expert knowledge or first-hand experience of event.
  • 86. 04
  • 88. Digital- any form of media that uses electronic devices for distribution. Interactive- refers to products and services on digital computer-based systems which respond to the user's actions by presenting content. Hypertextuality- allows a large quantity of information to freely move around within a series of interconnected nodes in the network.
  • 89. Network- refers to the communication channels used to interconnect nodes on a computer network. Virtual- is any type of data storage device — such as CDs, flash drives, or external hard drives — that you can connect to remotely to enable data sharing. Stimulated - it can be defined as “an agency or influence that stimulates to action or (const. to) that quickens an activity or process.”
  • 90. FORMAT OF PEOPLE MEDIA PRESENTED BY: ALIANGAN, REYMAR
  • 91. RELATIONSHIP/SOCIAL NETWORK- set of people who are connected to each other through meaningful social relationship and patterns of interaction. MICRO BLOGGING- the activity or practice of making short frequent post to a microblog.
  • 92. SPECIAL INTEREST NETWORK- promote contact between regulatory professionals working in the same specialist sector. MEDIA SHARING- a social media app. Enable users to create stove and share their multimedia files, shared media refers to content which is shared across third party platforms.
  • 94. OPINION LEADERS- is a leader for a certain group who gives details and information to lesser active persons in the group. CITIZENS JOURNALIST- people without professional journalism training that use the tools of modern technology and interact to create argument of fact check media on their own or in collaboration with others.
  • 95. SOCIAL JOURNALIST- journalist that uses social media to make their content available to more people. CROWDSOURCER- the person who obtains needed service ideas or content by soliciting contributions from a large group of people and specially from the online community.
  • 97. Introduction Flowchart Building 1. Facilitates open communication leading to enhanced information discovery and delivery. 2. Allows employees to discuss ideas, post ,news ask question and sharelinks. 3. Provides an opportunity to widen business contacts. 4. Improves business reputation and client base with minimal use of advertising. 5. Expands market research, implemants marketing campaign, delivery communication and direct interested people to specific websites. ADVANTAGES
  • 98. LIMITATIONS - Reliability - Allow incorect discovery of information - Time consuming
  • 100. What is the Value of People Media?
  • 101. Without people, there will be no information available in any kind of media. People and media should be considered as equally important because people create media and whatever information we have depends on the kind of expertise a person have.
  • 102. What is People Media?
  • 103. People Media. Refers to persons that are involved in the use, analysis, evaluation and production of media and information.