You are on page 1of 8

MEDIA and INFORMATION LITERACY ➢ Personal and institutional records of all types can be

2nd Grading found in archives, as well as media, ephemera, oral


histories, and even artifacts.
Lesson 5: MEDIA & INFORMATION SOURCES ➢ The materials housed in the archives are usually unique,
Print Material (Published sources) usually one of a kind items.
➢ Information could be in print format and these include: ➢ Archives store, preserve and make accessible records of
all printed books, periodicals, maps, bibliographies, enduring value that have not been produced in great
indexes and abstracts, photographs, government quantities for the general public for research and
documents, technical reports, etc. understanding.
➢ Archival materials are rare and irreplaceable and
Non-Print Materials therefore they are not loaned out to users.
➢ Information is also produced in other formats (non-print)
including audio, audiovisual, multimedia, microform and Library
electronic books, journals, images, texts/record from ➢ Libraries also provide access to resource such as full
the internet. text journal and magazine articles, periodical indexes,
and online encyclopedias.
Indigenous Knowledge (IK) or Unpublished sources
➢ It is neither written nor published but provides people in Internet
the community with strategies for survival. ➢ It is a global system of networked computers that allow
➢ Indigenous knowledge is the sum total of knowledge and user-to-user communication and transfer of data files
skills which people in a particular geographical area from one computer to another on the network.
possess that enables them to get the most out of their ➢ It is a worldwide system of computer networks—a
natural environment. This information/knowledge is not network of networks in which users at any one computer
systematically documented. can, if they have permission, get information from any
➢ It is oral in nature, usually transmitted through personal other computer (and sometimes talk directly to users at
communication; it is culture-specific and often other computers) on the network
generated with communities for local level ➢ On the other hand, the World Wide Web (WWW)
decisionmaking in agriculture, healthcare, food provides the technology needed to navigate the Internet
preparation, education, natural resources management is vast sea of resources. The WWW is a pathway of
and other activities accessing information over the Internet via Uniform
Resource Locator (URL) or web address
Human Sources (Colleagues/Peers)
➢ Communication with peers and colleagues are a good way FRAUDULENT IMITATIONS OF INFORMATION
of obtaining vital information. Information is defined as contextualized data that has the
➢ For example, doctors have been found to rely on their potential to be converted into knowledge. For it to be useful,
colleagues for information in order to solve a patient’s it must be factual and accurate. Raw data such as numerical
problems. figures are not necessarily information, but combining these
➢ The value of informal sources of information especially figures with other relevant data constitutes information.
colleagues and peers cannot be overstressed. When information is skewed or fabricated to deliberately
➢ The good side of it is that human sources mislead or to achieve a particular response from its audience,
(colleagues/peers) are readily available to provide it is no longer a reliable source. According to the Johns
needed information at the right time. Hopkins University Library, fraudulent or unreliable sources
➢ If the right person is contacted, quality and up-to-date can be classified into three types: propaganda,misinformation,
information will be obtained. The downside of using and disinformation. Each of them mislead the reader,viewer,
human sources is that there may be some element of bias or listener in different ways and in varying degrees.
in the information provided, or some people will say
things from their own point of view or exaggerate it. 1. PROPAGANDA
➢ Is the presentation of facts in a manner that elicits a
Archives desired response from its audience. The presence of
➢ Archives are places where records of all types and words that can misrepresent or distort information is
formats are kept and made accessible for research and common in propaganda because statements and opinions
other purposes. They are a good place to find primary with highly emotional or strong words are more likely to
sources, both unpublished materials and those that have make an impact on an audience. Political campaigns and
been published for their parent institution’s members or speeches are, in essence, propaganda, especially when
constituencies. statements that criticize opposing parties or political
ideologies are made.
Types of Propaganda Satire
 Not all fake news is meant to be harmful. Some of it is
2. MISINFORMATION simply meant to be funny.
➢ Is the unintentional propaganda of incorrect information.  It can be hard to tell sometimes whether a story is
It is commonly found in urban legends and chain emails. meant to be satirical or deceptive. This story was taken
Misinformation differs from propaganda in the sense from The Onion, a well-known satirical news website.
that it is always false or incorrect but differs from
disinformation because there is no intention to mislead.
Often, stories that were fabricated to deceive become
misinformation when shared by sincerely misguided
individuals with good intention.
➢ Information that is false, but not created with the
intention of causing harm.
➢ Example
A terror attack on the Champs Elysees in Paris on 20 April 2017
inspired a great deal of misinformation as is the case in almost all
breaking news situations. Individuals on social media unwittingly
published a number of rumors, including the news that a second
policeman had been killed, for example. The people sharing this type False connection
of content are rarely doing so to cause harm. Rather, they are caught  Sometimes legitimate newspapers,magazines, and
up in the moment, trying to be helpful, but fail to adequately inspect television shows publish news that is real, but the way
and verify the information they are sharing. they present the news is misleading. Here the New York
Daily News, a paper that has been in publication since
3. DISINFORMATION 1919,published a story in which the headline claims that
➢ Is the deliberate propagation of incorrect information. sugar is as addictive as cocaine and heroin. That's a very
Outright fabrication of information requires an ulterior frightening headline, isn't it?! I'm sure it caught your
motive, therefore sources of disinformation often eye. And that's the point. Stories like this are often
benefit from disseminating it. It follows, then, that referred to as "Clickbait." They have terrifying
circulators of disinformation are usually the government headlines that don't always give you the whole story. If
or organizations that want to present certain issues in a you were to read more of the article, you would discover
drastically different light, or to influence their audience that this theory has only been proven to exist in rats,
in a way that is favorable for them. not humans.
➢ Information that is false and deliberately created to
harm a person, social group, organization or country
➢ Example
One of the attempted hoaxes of the French election campaign, was
the creation of a sophisticated duplicate version of the Belgian
newspaper Le Soir with a false article that the presidential candidate
Emmanuel Macron was being funded by Saudi Arabia. Another
example was the circulation of documents online claiming falsely that
he had opened an offshore bank account in the Bahamas. And finally,
disinformation circulated via ‘Twitter raids’ in which loosely
connected networks of individuals simultaneously took to Twitter
with identical hashtags and messages to spread rumors about the
candidate’s personal life.

False context
 Here the creator of this meme uses a photograph from
the year 2000 and pretends that the photo was recent.
If you were to do a reverse image search on this photo,
you would discover that the image is of the young boy,
Elian Gonzalez, who was famously deported to his native
Cuba during the final year of the Clinton administration.
Imposter content
 Some fake news websites try to pretend that they are
other news agencies. The snapshot from the above
website is pretending to be ABC News, but it is not. How
can you spot these imposter websites? It can be
difficult sometimes, but you can almost always sniff-out
them out by checking the URL. The above URL is not
from abc news.com, it is from abcnews-us.com. Imposter
news will never be able to publish content from the real
news agency's website. So if you're unsure whether a
source is representing itself truthfully, Google the news
source, find its website, and see if the domain in the URL
matches.If it doesn't, you have an imposter.

Fabricated content
 Some stories are simply made-up and have no basis in
reality. Good lateral reading practices will quickly tell you
whether a story is real or fake.
 Pro-tip: if no one else is reporting a story, it's probably
fake.

MISLEADING CONTENT
 Misleading content is the by far the most difficult kind
of fake news to uncover. Misleading content can finds its
way into many, many real news stories and the reason its
so hard to discover is because it requires some kind of
expertise or knowledge about a given subject to
determine whether the facts and details in any news
article are being misrepresented. Fact-checking
resources can really help you make sense of these details.
The analysis was taken from the fact checking website,
Snopes.

 It's often said that "a picture says a thousand words,"


but for photos posted on the internet, those words are
not always truthful. The above photo was doctored using
Photoshop to make it look like Russian President Vladimir
Putin was grabbing US President Barack Obama's necktie.
However, if you were to do a reverse image search on
this photo, you would discover that Putin was not actually
grabbing the necktie in the original photo.
Political Campaigns: Propaganda Techniques
Propaganda - information, especially of a biased or misleading Using Slogans and Symbols
nature, used to promote or publicize a particular political 6. Glittering Generalities
cause or point of view.  Using broad, vague words that sound nice, but are not
specific.
What ways can candidates advertise?  Includes slogans
✓ Magazine  Examples: using the words hero, brave, honorable,
✓ Radio freedom, justice, etc.
✓ Billboards 7. Transfer
✓ Television  Associating something respected or approved with the
✓ Newspaper candidate.
✓ Internet- Social Media  Example: Appearing on a stage in front of an American
✓ Print Flag or mentioning a former president in speeches.

7 Propaganda Strategies Candidates use

Encouraging a Sense of Identification with a Person or Cause


1. Bandwagon
 Persuading people to do something by letting them know
others are doing it.
 Everyone is supporting a candidate or cause
 Example: Claiming the latest polls show you’re 10 points
ahead of your opponent.
 Example Ad: Candidate Trump at a campaign rally
2. Testimonial
 A famous person giving an endorsement to a candidate.
 Using the words of a famous person to persuade you.
 Example: a famous singer performing at a campaign rally

Rejection and Slanted Analysis


3. Plain folks
 Claiming to be one of the common people.
 Appealing to regular people’s values like family &
patriotism.
 Example: Talking about growing up in a small town
American. Wearing boots & a cowboy hat in Texas.
4. Name calling
 Trash-talking another product or person, "mudslinging”
 Calling the other side names.
 Example: Calling an opponent’s plan risky
5. Card stacking
 Presenting only facts that are favorable to your side,
either by telling only good things about your side or bad
things about your appointment.
 Example: listing recognitions you’ve received for your
efforts as major; recounting 10 missed votes of your
opponent.
Lesson 6: MEDIA AND INFORMATION LITERACY Aside from being labeled as “watchdog”, media is claimed to be the
EDUCATION Fourth Estate because of the way it establishes a check and balance
Citizenship among other estates such as the church, the government, and the
citizens.
T. H. Marshall (1950) defined citizenship as endowing all
It provides access to information that is necessary for citizens to
members of a community with certain civil, political,and social have “informed choices rather than acting out ignorance or
rights of membership, including “the right to share in the misinformation.” Media can educate and enlighten people about the
social heritage and to live the life of a civilized being matters that citizens are directly or indirectly affected.
according to the standards prevailing in society”.
Cybercrime Prevention Act of 2012
Digital Citizenship An act defining cybercrime, providing for the prevention,
➢ is the continuously developing norms of investigation, suppression and the imposition of penalties therefore,
and for other purposes
appropriate,responsible, and empowered technology use.
➢ To lead and assist others in building positive digital
CHAPTER II PUNISHABLE ACTS
experiences
SEC. 4. Cybercrime Offenses. — The following acts constitute the
➢ To recognize that our actions have consequences to
offense of cybercrime punishable under this Act:
others Offenses against the confidentiality, integrity and availability of
➢ To participate in a manner for the common good computer data and systems:
Nine themes:
1. Digital Access (1) Illegal Access. – The access to the whole or any part of a computer
2. Digital Commerce system without right.
3. Digital Communication and Collaboration (2) Illegal Interception. – The interception made by technical means
without right of any non-public transmission of computer data to,
4. Digital Etiquette
from, or within a computer system including electromagnetic
5. Digital Fluency
emissions from a computer system carrying such computer data.
6. Digital Health and Welfare (3) Data Interference. — The intentional or reckless
7. Digital Law alteration,damaging, deletion or deterioration of computer data,
8. Digital Rights and Responsibility electronic document, or electronic data message, without right,
9. Digital Security and Privacy including the introduction or transmission of viruses.
(4) System Interference. — The intentional alteration or reckless
Press Freedom hindering or interference with the functioning of a computer or
computer network by inputting, transmitting, damaging, deleting,
deteriorating,altering or suppressing computer data or program,
Media in Nation Building
electronic document, or electronic data message, without right or
Media as a watchdog of the society has a role to play in nation authority, including the introduction or transmission of viruses.
building. In the 1987 Philippine Constitution, there are (5) Misuse of Devices.
provisions stating the importance of media and communication (6) Cyber-squatting. – The acquisition of a domain name over the
in the process of strengthening the nation. internet in bad faith to profit, mislead, destroy reputation, and
➢ Section 24, Article II deprive others from registering the same.
The State recognizes the vital role of communication and
(b) Computer-related Offenses:
information in nation building.
(1) Computer-related Forgery. — The input, alteration, or deletion of
➢ Section 11, Article XII
any computer data without right resulting in inauthentic data with the
No franchise, certificate, or any other form of authorization intent that it be considered or acted upon for legal purposes as if it
for the operation of a public utility shall be granted except to were authentic, regardless whether the data is directly readable and
citizens of the Philippines or to corporations or associations intelligible
organized under the laws of the Philippines at least sixty per (2) Computer-related Fraud. — The unauthorized input, alteration, or
centum of whose capital is owned by such citizens, nor shall deletion of computer data or program or interference in the
such franchise, certificate, or authorization be exclusive in functioning of a computer system, causing damage thereby with
fraudulent intent: Provided, that if no damage has yet been caused,
character or for a longer period of than fifty years.
the penalty imposable shall be one (1) degree lower.
(3) Computer-related Identity Theft. – The intentional acquisition,
use, misuse, transfer, possession, alteration or deletion of identifying
information belonging to another, whether natural or juridical,
without right:Provided, that if no damage has yet been caused, the
penalty imposable shall be one (1) degree lower.

(c) Content-related Offenses:


(1) Cybersex. — The willful engagement, maintenance, control, or
operation, directly or indirectly, of any lascivious exhibition of sexual
organs or sexual activity, with the aid of a computer system, for
favor or consideration.
(2) Child Pornography. — The unlawful or prohibited acts defined and Professional Journalist
punishable by Republic Act No. 9775 or the Anti-Child Pornography is people in media because the mindset is toward higher
Act of 2009, committed through a computer system: Provided, that participation among outside contributors to be more involved
the penalty to be imposed shall be (1) one degree higher than that
in information sharing (but still within the bounds or
provided for in Republic Act No. 9775.
(3) Unsolicited Commercial Communications. — The transmission of
parameters of the journalism practice).
commercial electronic communication with the use of computer
system which seek to advertise, sell, or offer for sale products and PEOPLE MEDIA: PEOPLE AS MEDIA VS. PEOPLE IN MEDIA
services are prohibited unless:
(i) There is prior affirmative consent from the recipient; or
(ii) The primary intent of the communication is for service and/or
administrative announcements from the sender to its existing users,
subscribers or customers.
(4) Libel. — The unlawful or prohibited acts of libel as defined in
Article 355 of the Revised Penal Code, as amended, committed
through a computer system or any other similar means which may be
devised in the future.The Cybercrime Prevention Act of 2012 does
not really define cyber libel. It penalizes libel, as defined under the
Revised Penal Code but imposes a higher penalty because of the use of
PEOPLE AS MEDIA
information and communication technologies. (Excerpt from the
consider the ff examples:
published article of The Daily Tribune last 25 February 2019.)
1. Political campaigns during election/Political Communication
Some people acting as emissaries of political figures, spreading good
OPPORTUNITIES, CHALLENGES, AND POWER OF MEDIA
works and good news about political aspirants. These political town
AND INFORMATION criers are examples of people as media because apart from the media
Taking part in the information society is essential for citizens of all mileage that political candidates aspire for, they help a lot in
age groups. The internet provides great opportunities to improve life disseminating information albeit potential propaganda.
for all users. It has positive effects on education, the working world 2. Social Networking
and economic growth. This is one of the fastest ways of getting information to wider and
more diverse audiences in just one click of a tab or button. But this
Citizen Journalism social network account is owned by actual human being and is spread
➢ The International Media Support defined citizen either through personal discretion or as a professional decision.
journalism as “the gathering and reporting of news by
people who are not trained as professional journalist”. People as media are manifested through person-to-person transfer of
➢ It is the act in which a citizen, or group of citizens play content or information.
Online Virality- which you may roughly attribute as more of a
an active role in the process of collecting, reporting,
technological phenomenon. Ordinary people can also gain an audience
analyzing and disseminating news and information with
even with the most mundane content such as “pabebe”
the intention of providing independent, reliable, accurate,
wideranging and relevant information that is required
for democracy and development.

Phishing
An attempt at identity theft in which criminals lead users to a
counterfeit website in the hope that they will disclose private
information such as users’ names or passwords. It is
wellknown that email messages, texts and phone calls are
methods commonly used by criminals to approach people with PEOPLE IN MEDIA
Media practitioners themselves become people media.They are, in
the aim of committing financial or identity fraud … or both.
particular, people in media. They provide information coming from
Social Journalism
their expert knowledge or first-hand experience of events. People in
is likened to open publishing where readers intentionally or media are those involved in the media forms that they are primarily
unwittingly contribute content just by sharing through their engaged in ---print, broadcast, film, new media, and gaming.
online social media accounts

Social Journalist
is essentially a professional journalist or “paid and unpaid
contributors and readers.” The main concerns include level
and strength of writing, minimal factual errors, low
self-promotion and covert advocacy, and inherent
trustworthiness of the information at par with journalistic
standards.
Lesson 7: LEGAL, ETHICAL, AND SOCIETAL ISSUES IN 3. Geographic indications;
MEDIA AND INFORMATION 4. Industrial designs;
Five Basic Human Values 5. Patents;
➢ The Human Values of Love, Peace, Truth, Right Conduct, 6. Layouts-designs (Topographies) of integrated circuits; and
and Nonviolence are latent in every human being. They 7. Protection of undisclosed information
are our very natural and true characteristic.
➢ All objects in the world are subject to change; however,
the ideals, virtues and values established in human
hearts remain as a perennial source of inspiration to the
world.

Netiquette
➢ the etiquette of the internet
➢ simple rules for how you should act in Cyberspace that
keep things polite and help everyone get along
➢ rules about the proper and polite way to communicate
with other people when you are using the internet

Intellectual Property Right


In contemporary times, the creation of the human mind is
given so much value to the extent that mechanisms to protect
these creations are put in place. One such mechanism is legal
and ethical in nature. We know of it today as the intellectual
property right.

INTELLECTUAL PROPERTY IN INTERNATIONAL AND


LOCAL CONTEXT
Intellectual Property or IP
➢ "creation of mind, such as inventions, literary and
artistic works, designs and symbols, names, and images
used in commerce." (World Intellectual Property
Organization or WIPO)
➢ Since the products of human intellect have a direct
influence on human civilization and on the development of COPYRIGHT
societies, there should be safeguards on intellectual Copyright is mainly the protection of one's expressions which
property only becomes tangible and concrete when objects are created
World Intellectual Property Organization (WIPO) as manifestation of these expressions.
➢ a global forum for intellectual property services, policy,
information, and cooperation
➢ responsible for the promotion and protection of
intellectual property throughout the world through
cooperation among states and, where appropriate, in
collaboration with other international organization, and
for the administration of various treaties dealing with
intellectual property rights

The Intellectual Property Law of the Philippines


The Philippines, as a State signatory in the Convention
Establishing the World Intellectual Property Organization, is
dulybound to pass a law on intellectual property protection.
Thus, the enactment of Republic Act 8293,otherwise known
as “The Intellectual Property Code of 1997.”

According to the piece of legislation, intellectual property


rights consist of:
1. Copyright and related rights;
2. Trademarks and service marks;
COPYRIGHT PROTECTED WORKS THE RATIONALE OF FAIR USE IS TO “GUARANTEE A
➢ Original works are those that are literary or artistic in nature BREATHING SPACE FOR NEW EXPRESSION WITHIN THE
which include the following: CONFINES OF COPYRIGHT LAW.”
➢ Books, pamphlets, articles, and other writings ➢ The expiration of a copyright term empowers the
➢ Periodicals and newspapers
general public to have unlimited access and use of the
➢ Lectures, sermons, addresses, dissertations prepared for oral
delivery, whether or not reduced in writing or other material
work as it has become part of the “public domain.”
form ➢ Anything that is within the realms of the public domain
➢ Letters cannot owned by anyone and has no copyright coverage.
➢ Dramatic or dramatic-musical compositions; choreographic
works or entertainment in dumb shows WHAT WORKS ARE COVERED BY FAIR USE?
✓ a criticism or a commentary;
Original works are those that are literary or artistic in nature ✓ a parody;
which include the following: ✓ a news report;
❖ Musical compositions, with or without words ✓ an artistic expression or artifact;
❖ Works of drawing, painting, architecture, sculpture, engraving, ✓ scholarly and research works;
lithography or other works of art; models or designs for works
✓ a product of a time-shifting device such as a TV program
of art
recorder; or
❖ Original ornamental designs or models for articles of
manufacture, whether or not registered as an industrial design, ✓ an information found through Web search engines; it
and other works of applied art becomes available for unlimited use by the public
❖ Illustrations, maps, plans, sketches, charts and
three-dimensional works relative to geography, topography, WORKS ARE COVERED BY FAIR USE IF…
architecture or science  its use is based on a factual and historical news event;
❖ Drawings or plastic works of a scientific or technical character  it is only a small portion of the work and the purpose is a
❖ Photographic works including works produced by a process
commentary;
analogous to photography; lantern slides
 its use is “transformative”
❖ Audiovisual works and cinematographic works and works
produced by a process analogous to cinematography or any  it is used solely for the purpose of scholarly analysis; and
process for making audio-visual recordings;  it is not infringing and does not hurt the market value of
❖ Pictorial illustrations and advertisements the copyrighted material
❖ Computer programs
❖ Other literary, scholarly, scientific and artistic works LEGAL SHARING USING CREATIVE COMMONS
Creative Common License enables copyright holders to easily
Derivative Works, On The Other Hand, Refer To: change terms of copyright “from the default of all rights
❖ Dramatization, translations, adaptations, abridgements,
reserved to some rights reserved.” Thus, it “gives people the
arrangements, and other alterations of literacy or artistic
right to share, use, and even build upon a [created] work.”
works
❖ Collections of literary, scholarly or artistic works, and
compilations of data and other materials which are original by FLAME WARS
reason of the selection or coordination or arrangement of their Flamer is a term defined as someone who knowingly attacks
contents other netizens or expresses in aggressive manner his opinion
Publishers own copyright limited to the right of reproduction of the on controversial issues. To widen your online vocabulary, you
typographical arrangement of the published edition of the work. may check the following terms on the Internet:
1. Flame
WORKS NOT PROTECTED
2. Flame War
There are also works that are not covered by copyright due to
3. Troll
insufficient authorship or due to the work being of
4. Flaming
importance to public interest.
1. Unprotected Subject Matter
2. Works of the Government

Fair Use
➢ The IP law of the Philippines specifies certain limitations or
exceptions to copyright including a provision also referred to as
fair use or fair dealing clause.
➢ Fair use limits the rights of holders who are entitled to
reproduce works for a limited time period.
➢ When you wish to copy an entire work or portions of it even with
the copyright holder failing to give his or permission, fair use
may be invoked in certain occasions

You might also like