You are on page 1of 10

COMPUTER EDUCATION 8

Subject Area: COMPUTER EDUCATION 8 Quarter: FIRST


Unit Topic: USING MULTIMEDIA AND Lesson Number: 1
IMAGE MANIPULATION PROGRAM Time Allotted: 120 mins

Lesson 1: UNDERSTANDING MULTIMEDIA AND ITS ETHICAL ISSUES

INTRODUCTION

Have you imagined your life without the presence of videos and technologies? Do you
think you will be able to live in the past life where technologies don’t exist yet? Why?

These videos, graphics and other computer generated interactions are called multimedia.
They are essential topics that you are going to learn in this lesson.

OBJECTIVES:

Students will be able to:

a. define and identify multimedia used in current day society


b. be informed on the following:
i. Intellectual Property Rights;
ii. Creative Commons;
iii. Privacy;
iv. Deception;
v. Censored works;
vi. Defamatory reproductions;
c. display a sense of responsibility when dealing with ethical issues in technology.

DISCUSSION
Preparatory Activity

Base on your own understanding answer the following questions below. You can
ask for help from your parent/s and see if you have the same answers.

1. What is multimedia?

2. What is privacy in multimedia?

Retrieved from: www.iconarchive.com

1|Page
COMPUTER EDUCATION 8

Discussion Proper
A. Multimedia is the combination of different technologies. It includes video, audio, graphics and
computer generated interactions.

The combination of various media has produced new effects from the new technology. In addition,
the Internet has drawn concern on privacy and the need for online ethical standards.

Exercise 1: What can you say about the illustration below? Write your answer on the
space provided.

Retrieved from: https://tinyurl.com/ycw2v928

______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
_____________________________________________________________________

B. Intellectual Property Rights are the right of an individual over his or her written works. Protecting
this works can provide motivation for an author to share his or her work.

Intellectual property has 4 key rights: patent, copyright, trademark, and trade secret.

1. Patent –is an exclusive right granted for


an invention, which is a product or a
process that provides, in general, a new
way of doing something, or offers a new
technical solution to a problem. To get a
patent, technical information about the
invention must be disclosed to the public
in a patent application.

World Intellectual Property Organization (n.d.).Patents


https://www.wipo.int/patents/en/
Retrieved from: https://www.wipo.int/patents/en/

2|Page
COMPUTER EDUCATION 8
2. Copyright - is a legal term used to
describe the rights that creators have over
their literary and artistic works. Works
covered by copyright range from books,
music, paintings, sculpture, and films, to
computer programs, databases,
advertisements, maps, and technical
Retrieved from: https://tinyurl.com/y9wxkk78
drawings.
World Intellectual Property Organization (n.d.). Copyright
https://www.wipo.int/copyright/en/

Exercise 2: Reflect and answer the given question below.

You posted your artwork on your social media. You noticed that your post
was shared by random page and claimed it as their own. How would you
feel about it?

_____________________________________________________________

_____________________________________________________________

_____________________________________________________________

_____________________________________________________________

3. Trademark – Is a sign capable of


distinguishing the goods or services of one
Trademark Logo enterprise from those of other enterprises.
Trademarks are protected by intellectual
property rights

World Intellectual Property Organization (n.d.). Trademark


Registered
https://www.wipo.int/copyright/en/
Trademark

4. Trade Secrets – can be confidential


business information that provides a
competitive advantage edge. It covers
manufacturing or industrial secrets or
commercial secrets.

The unauthorized use of such information


by others is regarded as an unfair practice
and a violation of the trade secret.
Retrieved from: https://tinyurl.com/ybjgkv5q

3|Page
COMPUTER EDUCATION 8
C. Creative Commons is a nonprofit organization devoted to expand the range of creative works. It is
made available for others to upon legally and to share.

Retrieved from: https://bit.ly/3eKmpwn

It has released several copyright – licenses


known as Creative Commons Licenses, free
of charge to the public. An easy – to –
understand one – page explanation of rights,
with associated visual symbols, explains the
specifics of each Creative Commons license.

Retrieved from: https://bit.ly/3dICKQU

Creative Common licenses do not replace


copyright, but are based upon it. They
replace individual negotiations for specific
rights between copyright owner and licensee,
which are necessary under an all rights
reserved copyright management.

The result is agile, low – overhead and low –


cost copyright – management regime,
profiting both copyright owners and
licensees.

Wikipedia uses one of these licenses. Retrieved from: https://bit.ly/3ii1zqj

Exercise 3: Go Online!

With the help of your parent/s or guardian, use your mobile phone or
computer with Internet connection and look for companies that uses
Creative Commons license, list down at least ten (10). Write your answer
on the space provided.

1. 6.

2. 7.

3. 8.

4. 9.

5. 10.

4|Page
COMPUTER EDUCATION 8
D. Multimedia Privacy
We take images and videos and share them across friends over network. There is a concern about
loss of privacy in such data. We must look into the security and privacy of multimedia data during
storage, processing and communication.

Since the capture and processing are by two (2) different devices (often on two different locations),
multimedia communication is critical. Popular internet protocols are not secure enough.

Traditional encryption schemes are not


ideally suited for multimedia due to the
bulkiness of data, strict standards, and
practices enforced in multimedia storage and
communication.

Therefore, investigations in security and


privacy of multimedia involved development
of algorithms that specially suits the
properties of visual data.
Retrieved from: https://bit.ly/38f4N9B

Specific activities includes:


a. Efficient video encryption algorithm
b. Privacy in video surveillance
c. Privacy preserving information retrieval and mining
d. Secure classification for biometric data
e. Secure and fast multimedia communication

E. Online Deception also known as digital deception, digital disinformation, internet deception, or
cyber deception is the use of Information and Communications Technology to deceive other online
users.

Unfortunately, many people are easily


deceived online because they want to believe
what they see, hear and read online is real
and attainable.

For us not to fall victim to online deception,


we must refrain from sharing personal
information online. The less personal
information we share, the lower the
probability of being attacked or approached
online,
Retrieved from: https://bit.ly/2BpGLMZ

Exercise 4: Reflection
How will you encourage other students to stay safe online? What should you
do in order to not be deceived?

______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

5|Page
COMPUTER EDUCATION 8
F. Censored Work
One of the early nicknames for the internet was the information superhighway. It was supposed to
provide an average person with fast access to limitless amount of data.

For many users, that is exactly what accessing the internet is like. For others, it is as if the
information superhighway has some major roadblocks in the form of internet censorship.

Censorship can range from well-intentioned


desires to protect us from unsuitable content
to authoritarian attempts to control a nation’s
access to information. No matter what the
censor’s reasons are, the end result is the
same – they block access to the web pages
they identify as undesirable.
Retrieved from: https://bit.ly/2BdNcTx

Internet censorship is not just a parental or


governmental tool. There are several
software products that can limit or block
Retrieved from: https://bit.ly/2BdNcTx access to specific websites. These programs
are also known as web filters.

G. Defamatory Reproductions
Defamation as defined by Merriam Webster is the act of communicating false statements about a
person. These can be slanderous or libelous statements that could damage the reputation of a
person.

The internet and social media are great tools


in general, but they are also an effective
breeding ground for potential libelous
statements.

Many people have learned that the internet


allows people to speak their minds almost
too easily. The internet is full of interesting
websites where someone could intentionally
Retrieved from: https://bit.ly/2NJjAjr
or accidentally leave a potentially
defamatory comment or post.

A few locations where defamatory posts are in letter to the editor of local newspapers, public
comments on media websites, blog and comments to blog postings, social media like Facebook,
LinkedIn, and Twitter and chat rooms.

Retrieved from: https://bit.ly/38bAq3I Retrieved from: https://bit.ly/2BgjoWm Retrieved from: hhttps://bit.ly/3i9ziCt

While some websites screen posts for inflammatory or illegal content, the screening systems are
not geared to examine every post for defamatory content and so many defamatory postings end up
online.

6|Page
COMPUTER EDUCATION 8
SUMMARY

Multimedia is the combination of video, audio, graphics and computer generated


interactions.

Multimedia and the internet have opened windows to connect everything with the
click of the mouse. New window has also opened to issued that can test how
much character a person would possess.

As responsible persons, we act according to what our conscience tells us. We


should avoid bad things that can affect us or others. Our conscience is our inner
voice that tells us how to act, for instance, always think before we click.

The ethical issues on multimedia are: intellectual property rights, creative


commons, privacy, online deception, censored works, and defamatory
reproductions.

KNOWLEDGE CHECK

Identify an Issue
Choose one intellectual property rights issue that you encountered or read.
Conduct a research more about the issue, and write it on the space provided.

7|Page
COMPUTER EDUCATION 8
ACTIVITY 1

PAST and PRESENT


Using a Venn diagram, list down the differences on the use of multimedia before and at
present. Place them on each circle. In the middle where both circle meet, place the
similarities on the uses of multimedia.

PAST PRESENT

ACTIVITY 2

READ AND WRITE!


Explain how Creative Commons helps in copyright management. Conduct research and list 5
companies that uses Creative Commons license. Look for the information on the Internet or on
available reading materials like books and magazines. Disregard the example given in the lesson.

8|Page
COMPUTER EDUCATION 8
ASSESSMENT

Let’s Test Ourselves

IDENTIFY THE TERMS


Directions: Identify the word each statement is describing. Write your answers on the space provided for.

___________ 1. These are slanderous or libelous statements online that could damage the reputation of
a person

___________ 2. This is the combination of different technologies such as videos, audios, graphics and
computer generated interactions.

___________ 3. This is a nonprofit organization devoted to expand the range of creating works. This is
available for public to build upon legally and to share.

___________ 4. This is a legal term that describes the rights of an author. This covers book, music,
artworks, films, computer programs, advertisements, maps, etc.

___________ 5. This is a sign that distinguishes the products or services of one enterprise from another.

Self-Check

Answer the following questions written below.

1. Why do you think it is important to “think before we click”?

_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________

2. As a student, how will you encourage others to practice Internet safety whenever browsing or
surfing the net?

_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________

9|Page
COMPUTER EDUCATION 8

SUMMARY

In this lesson, you have learned


about multimedia and ethical
issues connected to it. You also
learned to be a responsible
individual whenever you’re
browsing the internet, which is to
think before you click.

REFERENCES

- Cobre, Elmeryn Joy L., et. al, Computers for Digital Learners 8: Teachers Wraparound Edition,
Phoenix Publishing House, 2018

- World Intellectual Property Organization (n.d.).Patents https://www.wipo.int/patents/en/

- World Intellectual Property Organization (n.d.). Copyright https://www.wipo.int/copyright/en/

- World Intellectual Property Organization (n.d.). Trademark https://www.wipo.int/copyright/en/

FEEDBACK

ANY COMMENTS?
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

10 | P a g e

You might also like