3. Objectives
Identify the importance about legal,
ethical, and societal issues in media
and information
Examine the given examples
Develops a clear understanding about
the consequences, advantages, and
disadvantages
5. is a legal word used to express
the ownership rights that
authors and artists have to
their creative works.
6. Importance of copyright
by allowing the author,
professor, or researcher
who created the work to
prevent its unauthorized or
uncredited use, it helps to
preserve the value of their
work.
9. What can wecopy?
The Copy Right holder has given you
permission to copy the work
Whose Copy Right has expired
Your Copying is permitted by Fair Use
10. is the use of works protected by copyright
without permission for a usage where such
permission is required, thereby infringing
certain exclusive rights granted to the
copyright holder, such as the right to
reproduce, distribute, display or perform
the protected work, or to make derivative
works.
CopyRightInfringement
11. Copying original and intellectual
creations is considered as copyright
infringement and is punishable under
Republic Act No. 8293, otherwise
known as the Intellectual Property
Code of the Philippines (“IP Code”).
RepublicActNo. 893
15. 4 Factors of Fair Use
1.Purposes and character of uses
2. Amount and sustainability of
work used
3. Nature of the copyrighted work
4.Effect of your use on the market.
16. Advantage and Disadvantages of
Fair Use
Advantages
Without their approval, you can still
obtain the owners' work and leave a
citation.
Disadvantages
People will be greedy getting work of other
People make profit for it
20. 7 common types of plagiarism
Complete Plagiarism
the most severe form of
plagiarism where a
researcher takes a
manuscript or study that
someone else created,
and submits it under his
or her name. It is
equivalent to intellectual
theft and stealing
Direct Plagi
Direct plagiarism
someone plagiari
author's work with
any effort to ackno
the information ca
outside sou
21. Paraphrasing
Plagiarism
This type of plagiarism
arises when you change
the words, but you still
present another
person's concepts as
your own.
Self
Plagiarism
Self-plagiarism is
defined as a type of
plagiarism in which
the writer
republishes a work in
its entirety or reuses
portions of a
previously written
text while authoring
a new work.
22. Patchwork
Plagiarism
Direct "patchwork"
plagiarism occurs
when a writer
copies material
from several
writers and
rearranges that
material with no
attempt to
acknowledge the
original sources
Source
Based
refers to
instances
when
misleading
sources
are
involved
Accidental
Occurs when a
neglects to cite
their sources, or
misquotes their
sources, or
unintentionally
paraphrase a
source by using
similar words,
group of words
and sentences.
23. Robert Van Winkle "vanilla ice"
Former First Lady Melania
Trump (2016)
Former Senator Joe Biden (1987)
Co-Founder David Mikkelson
(2021)
25. derived from the word
"etiquette," which refers
to the general rules or
conventions of correct
and polite behaviour in
social settings and
situations. It is thus the
practice of exercising
polite and considerate
behaviour in online
contexts, such as Internet
discussion boards and
personal email
26. Online communication can be made more
with the use of netiquette, which also he
stay clear of confusion and potential con
Without a solid grasp of netiquette, you r
of unintentionally engaging in abusi
cyberbullying behavior.
Importance of Netiquette
27. CoreRulesinNetiquette
1. Remember the Human
2. Adhere to the same standards of behavior
online that you follow in real life
3. Know where you are in cyberspace
4. Respect other people's time and
bandwidth
5.Make yourself look good online
28. Share expert knowledge
The Internet offers its users many benefits; one is the ease in
which information can be shared or accessed and in fact, this
"information sharing" capability is one of the reasons the
Internet was founded
Help keep flame wars under control
"Flaming is what people do when they express a strongly held opinion
without holding back any emotion." (Shea, 1994). As an example,
think of the kinds of passionate comments you might read on a
sports blog. While "flaming" is not necessarily forbidden in virtual
communication, "flame wars," when two or three people exchange
angry posts between one another, must be controlled or the
camaraderie of the group could be compromised.
29. Respect other people's privacy
Depending on what you are reading in the virtual world, be it an
online class discussion forum, Facebook page, or an email, you may
be exposed to some private or personal information that needs to
be handled with care.
Don't abuse your power
Just remember: knowing more than others do or having
more power than others may have does not give you
the right to take advantage of anyone
30. Be forgiving of other people's
mistakes
At some point, you will see a stupid question, read
an unnecessarily long response, or encounter
misspelled words; when this happens, practice
kindness and forgiveness as you would hope
someone would do if you had committed the same
offense.
32. The digital divide is a term that refers
to the gap between demographics and
regions that have access to modern
information and communications
technology (ICT), and those that don't
or have restricted access
34. unequal distribution of income and
opportunity between different groups
in society. It is a concern in almost all
countries around the world and often
people are trapped in poverty with
little chance to climb up the social
ladder.
EconomicDivide
38. Low Self Esteem
when someone lacks confidence about who they are and
what they can do. They often feel incompetent, unloved, or
inadequate
Personal Dissatisfaction
the state of being dissatisfied with oneself a
sense of self–dissatisfaction at his poor
performance
39. Depression
mood disorder that causes a persistent
feeling of sadness and loss of interest
Hyperactivity
a person may seem to move about constantly,
including in situations when it is not
appropriate, or excessively fidgets, taps, or
talks
Lack of Affection
Also known as being touch starved or having
skin hunger, touch deprivation is a real
condition people experience when they
receive little to no touch from others
40. Low Literacy Levels
College graduates are 10 times more likely to reap the
benefits of the internet and computer daily, compared with
indivduals with lower levels of education
Lack of motivation to learn how to use technology
Some individuals have the income, skills, and education
necessary to access the internet but are uninterested in
learning how to use digital devices and reaping the
internet's benefit
41. Low Income Levels
Computer ownership and a high-speed connection
are 10 times more common among wealthy families
than low-income families
Lack of Physical Access to Technology and
Digital Literacy
individual without physical access to
technology are less likely to develop the
skills necessary to use digital devices
45. A neuropsychological disorder
characterized by a persistent and
intense urge to engage in
certain behaviors, often usage of a
drug, despite substantial harm and
other negative consequences.
Addiction
46. is an impulse control disorder
that involves the obsessive use of
mobile devices,
the internet or video games,
despite negative consequences to
the user of the technology.
Technology
Addiction
50. Physical bullying
Physical bullying includes hitting, kicking, tripping,
pinching and pushing or damaging property.
Physical bullying causes both short term and long
term damage.
51. Verbal bullying
Verbal bulling includes name calling, insults, teasing,
intimidation, homophobic or racist remarks, or verbal
abuse. While verbal bullying can start off harmless,
it can escalate to levels which start affecting the
individual target.
52. Social bullying
Social bullying, sometimes
referred to as covert
bullying, is often harder to
recognise and can be
carried out behind the
bullied person’s back. It is
designed to harm
someone’s social reputation
and / or cause humiliation.
Social bullying can include:
lying and spreading rumours
negative facial or physical gestures,
menacing or contemptuous looks
playing nasty jokes to embarrass and
humiliate
mimicking unkindly
encouraging others to social exclude
someone
damaging someone’s social
reputation or social acceptance.
54. is the use of cell phones, instant
messaging, e-mail, chat rooms or
social networking sites such as
Facebook and Twitter to harass,
threaten or intimidate someone
CYBERBULLYING
55. Examples ofCyberBullying
Sending mean texts or IMs to someone.
Pranking someone's cell phone.
Hacking into someone's gaming or
social networking profile.
Being rude or mean to someone in an
online game.
Spreading secrets or rumours about
people online.
Pretending to be someone else to
spread hurtful messages online.
56. Republic Act No. 10627 or the "Anti-Bullying Act of 2013"
is a relatively new law which seeks to address hostile
environment at school that disrupts the education
process which, in turn, is not conducive to the total
development of a child at school. Those found to be
engaged in the act of bullying —regardless of age and
discernment —will have to comply with civil liabilities
including a penalty ranging from P50,000 to P100,000.
RA 10627
61. Refers to a specific sign associated with
a particular brand or goods or services.
Companies use a trademark to
distinguish their products from other
available and
similar products in the market.
TRADEMARK