You are on page 1of 24

MEDIA AND INFORMATION LITERACY CM4 through dominant forms of media or through forms of

communication unique to their group.


MEDIA AND INFORMATION SOURCES
Through these local channels or forms, culture is
Information is already processed data. Meaning,
preserved, handed down, and adapted. Examples of
somewhere along the way an interpretation has already
indigenous media include folk or traditional media,
been made by the reader and then shared to others.
gatherings and social organizations, direct observation,
Sometimes, this is where misunderstandings start,
records (written, carved, or oral), and oral instruction.
because different people have different interpretations
According to the International Institute for Rural
of information coming from just one source. For
Reconstruction (IIRR) toolkit for documenting
example, journalists who cover a similar event may
indigenous knowledge (IK), here are some
write different articles about it, depending on the angle
considerations when it comes to sources of information
they choose to write about. If you’re familiar with
about IK:
journalistic practices, this is a legitimate course of action
 Community members, especially elders, are the best
and not at all an alibi for ‘bias’ as some would say. This
sources of IK. But, since IK is unevenly distributed in
is part of the editorial process determined by
communities, it is important to find out who knows
journalistic values.
what to tap the right sources. Otherwise, data will not
Indigenous Media As we explore the formal sources of truly reflect IK in the community. For example, the
media and information, we need to understand that the women who are in charge of home gardening, and not
ecosystem of information and related materials will not anyone else, should be the ones asked about them. It is
be complete without indigenous media and information their field of expertise.
sources. The term indigenous knowledge implies a  Folklore, songs, poetry, and theater can reveal a great
connection to place and to indigenous or first/aboriginal deal about people’s values, history, and practices. These
people. It is local knowledge and is defined by Warren are often not written down and therefore, need to be
(1991) as the knowledge that is unique to a given recorded.
culture or society. Most often it is not written down. It is  Although IK is mostly transmitted by word of mouth,
the information base for society, which facilitates some indigenous forms of recordkeeping exist. These
communication and decision making. Indigenous include community records like writings, paintings, and
information systems are dynamic and are continually carvings. Records can also consist of trees planted as
influenced by internal creativity and experimentation as boundaries, notched poles, and many other forms.
well as by contact with external systems (Flavier et al.,  People working with communities such as
1995). extensionists, can be valuable sources of IK.
Indigenous knowledge today can be in any form of It is important that we acknowledge the valuable
media that is created and controlled by the community resource we have in indigenous knowledge and channel
for the community and about the community. This is it through indigenous media and information. After all,
because print, broadcast, and new media still cannot before the development of cities and metropolises, the
reach some rural areas, although they have a wide indigenous person/people (IPs) and the lumads were
reach. Indigenous media and information then aim to here first and thus have access to ancient practices that
develop and produce culturally appropriate information still work and are perhaps better than ours because it is
in the languages understood by the community. These less destructive to the environment. Ignoring
are channels for change, education, and development indigenous media and information can only result in
because of its direct access to local channels. They are development and education programs that are
also highly credible because they are near the source irrelevant and ineffective.
and are seldom circulated for profit. Some notable
examples from around the world include Tambuli Radio
Network in the Philippines, the Deadly Mob aboriginal
organization of Alice Springs, Australia, and the Koahnic
Broadcast Corporation in Alaska. These are content
about indigenous peoples that may be distributed
Library Books have been familiar to us for a long time. internet is easy, but it requires more discipline to check
Usually, a huge number of books from general to and validate. Factual and fictitious data are often
specific subjects is arranged in a room which today we merged. It is our duty then as smart users of media to
call a library. All literary, musical, artistic, or reference always validate our source.
materials (books, manuscripts, recordings, or films) are
Here is a checklist to help us determine the reliability of
kept but not for sale.
information found in the internet:
Libraries, either physical or digital, are often classified Author. The author’s willingness to be identified is a
into four groups: good indication of reliability.
o academic libraries that serves colleges and Date of publication or update. While the information
universities, may be true, it may not be reliable if it is outdated and
o public libraries that serve cities and towns of all types, may have lost relevance.
o school libraries that serve students from Kindergarten Citations. Reliable authors have the discipline of citing
to Grade 12, and sources of their information.
o special libraries that are in special environments such Domain or owner of the site or page. The domains .edu
as hospitals, corporations, museums, military, private and .gov are reserved for academic institutions and the
businesses, and the government. government, respectively. Information from such sites
are presented with caution and are usually well-
Due to the wealth of information in a library, it is
grounded.
important to know the following skills in accessing
Site owners may have an agenda that affects how
information:
information is presented Site design and writing style.
-the access tool to use
Credible sources take time to make their information
-how the information being accessed may be classified
accessible and easy to comprehend.
-the depth of detail required (some libraries provide
only an abstract of the topic) Also, in determining whether information is accurate,
-more detailed information might require membership run it by this checklist:
or some conformity to the set rules of the source (e.g. -Look for facts.
database). -Cross-reference with other sources to check for
consistency.
Libraries of published books are often considered highly
-Determine the reason for writing and publishing the
reliable, accurate, and valuable. This is because ISSN or
information. Check if the author is objective or leaning
ISBN registration ensures that standards were followed
heavily on a certain point of view
in producing these materials. Books and documents
-Check for advertising. Advertisers may use related
from dominant sources are also often peer reviewed.
information to market their product.
Hence, secondary information coming from libraries
are the closest we could get to accuracy and reliability if Too often we suffer from information overload from the
we happen to not have any access to primary sheer glut of data available. Scammers, trolls, and other
information in the form of indigenous knowledge and purveyors of fake news are getting very clever with
other firsthand data from experts misinformation dissemination. Therefore, we must also
empower ourselves so that even without Wonder
Internet The Internet is a global computer network
Woman’s golden lasso of truth, we can decide what to
providing a variety of information and communication
believe and what to reject as mere pish-posh.
facilities, consisting of interconnected networks using
standardized communication protocols. Common
search engines used for surfing information are Google,
Yahoo and Bing.
Information found on the internet may be quite varied
in form and content. Book copies, published articles and
journals, blogs, recorded videos, etc., can all be found
using the internet. Thus, it is more difficult to determine
its reliability and accuracy. Accessing information on the
RAVAT Checklist Now there has also been the rise of alternative media
and information as counterpoint to mainstream and
And since we already know the various media and
mass media. Independent media, as some call it,
information sources we have, it’s time to determine
include social media, blogs, and flash mob
how credible they are. Here is RAVAT, another
performances. These alternative forms provide greater
mnemonic to help us discern what’s good and what’s
freedom and power to ordinary individuals and are a
not.
quicker way of distributing information. The downside is
Reliability Information is said to be reliable if it can be that a lot of the information being passed around is
verified and evaluated. Others refer to the biased and inaccurate. Nevertheless, credible
trustworthiness of the source in evaluating the alternative media sites are actually good ways of
reliability of information. looking at “the other side” of mainstream, the side not
often looked at, advocating marginalized groups that
Accuracy It is the closeness of the report to the actual are usually taken for granted by corporate and
data. Measurement of accuracy varies, depending on government-controlled media outlets.
the type of information being evaluated. Forecasts are Remember, while it may be difficult to fully determine
said to be accurate if the report is like the actual data. the reliability, accuracy, value, and timeliness of any
Financial information is considered accurate if the information, as well as the authority of the source,
values are correct, properly classified, and presented. literacy in media and information benefits from the
Value Information is said to be of value if it aids the user development of these skills.
in making or improving decisions. The value of the Summary:
information may also depend on the need of the user.
-What are the different sources of information?
Authority of source Much of the information we gather Information can come from both firsthand/primary and
daily do not come from a primary source but are passed secondhand/secondary sources. Indigenous knowledge
on through secondary sources such as writers, is a good source of firsthand information while the
reporters, and the like. Sources with an established library and internet are for secondhand information.
expertise on the subject matter are considered as
having sound authority on the subject -Why is it necessary to differentiate between sources of
information?
Timeliness Reliability, accuracy, and value of Information should not be taken at face value. Knowing
information may vary based on the time it was its source and the differences between sources helps us
produced or acquired. While a piece of information may discern which piece of information is credible and worth
have been found accurate, reliable, and valuable during sharing to others. Your purpose in using the information
the time it was produced, it may become irrelevant and will also determine which source you will likely look at.
inaccurate with the passing of time (thus making it less
valuable). Other information may be timeless, proven to -How do we evaluate media and information sources?
be the same in reliability, accuracy, and value We run them by the RAVAT checklist for reliability,
throughout history accuracy, value, authority, and timeliness. That way, we
can discern if the information is relevant or not.
MEDIA AND product. Setting can also include any of these elements:
 Climate/season
INFORMATION LITERACY  Landscape
 People
CM5  Social structures and economic factors
 Moral attitudes and behavioral codes.
MEDIA AND INFORMATION LANGUAGES: GENRE,
The depiction of setting in a film foregrounds the
CODES, AND CONVENTIONS
atmosphere in it and by extension, the emotional
Media and Information Languages expectations that the audience could have. Tate Taylor’s
Deciphering the media and information languages is like 2016 film The Girl on the Train opens with the main
playing charades: to win the game, that is, to character on a train speeding to New York City, with the
understand the message, we have to be familiar with trains movement and the girls point of view already
the hints that are given to us. To do so, we must speak a setting the stage for the movement of the narrative.
common language governed by certain codes and
The mise-en-scène refers to the visual elements in the
conventions. Common means that the rules in
frame. This means that the composition of all the
understanding the code are shared by members of the
elements found within the physical boundaries of the
group who use that code.
shot or the frame creates an effect on the audience and
Robert Young (2017) classifies media codes into three:
establishes the context of the narrative. For instance,
symbolic codes, technical codes, and written codes.
one shot or frame could include the setting, the props,
“Conventions are expected ways in which codes are
the costumes, the lighting, and the characters. These
organized in a product” (Young, 2017).
elements also help us determine the genre of the media
product. Take a look at this table below.

These codes and conventions in media language and the


choices made regarding their selection, combination,
and exclusion influences “meaning in media products to The combination of these components in a single shot
create narratives, to portray aspects of reality, to will help establish the context of the narrative and set
construct points of view, and to represent the world in the expectations of the audience.
ways that convey messages and values” (“Media
Acting, on the other hand, is perhaps the most obvious
language”, 2017). In other words, being a smart user of
element we observe as audiences. The actor plays a
media also requires us to know exactly how these
character through the use of facial expressions, body
elements are put into play.
language, vocal qualities, and movement. Some
Codes
elements like accent, a nervous tic, and the kind of walk
Symbolic codes the actor employs for the character all help establish
key point: Symbolic codes are conceptual codes that that character for us and make them more believable.
any kind of audience will immediately pick up on to help
them interpret the message of a media product. Aside from acting, the color palette of a film also helps
deliver a specific message and foreground our
Symbolic codes take on the lives of symbols; meaning, expectations. We have been taught the meanings of
the depiction of these codes in a media product frame colors in our Art classes when we were younger. Those
or shape the narrative in associative or connotative meanings, albeit varying in different cultures, are still
terms. These codes include setting, mise-en-scene, very useful. The color palette in the first few shots of
acting, and color. The Girl on the Train is monochromatic blue and other
The setting includes the time and place in the media dark colors when the scenes focus on the character
played by Emily Blunt. When the scenes shift to the
views that she’s seeing, i.e., the houses in the suburbs,
When the camera looks up, this low angle creates an
the colors suddenly become light and sunshiny,
impression of power, making the subject look large. A high
depicting life in stark contrast to hers.
angle when the camera looks down creates an impression
You may notice that all these elements are codes that of weakness because the subject appears small. On the
we are aware of when we see a media product. We other hand, if the camera looks at the subject from eye-
don’t really need technical knowledge to say that the level in a normal or straight angle, the subject looks equal
color palette of a film affects its message. Those are to the viewer which helps them feel equal to and identify
symbolic codes for you: because they are social in with the subject. Still, there are also some film terms
nature, these codes “live outside the media product which we may already be familiar with.
themselves, but would be understood in similar ways in
the „real life‟ of the audience” (Young, 2017). If our
lives were also one big ongoing film, we would
recognize these codes right away.

Technical Codes
key point: Technical codes depend on the particular
medium we are using and require more than just a
cursory knowledge from the audience, unlike symbolic
codes
Unlike symbolic codes, technical codes require technical
knowledge. They are also “specific to a media form and
do not live outside of them” (Young, 2017). Different
mediums such as film and photography have different
codes that are only confined to such mediums and not
to anything else. The use of stark lighting in
photography, for instance, can convey an atmosphere
of unceasing violence because it is a static medium. In
contrast, films do not often use stark lighting in every
shot or frame; films also progress through several
scenes which could help soften the visual effects any
stark lighting may have on an audience.

Technical codes in media include camerawork, editing,


audio, and lighting.
Camerawork refers to “how the camera is operated, These different techniques of visual composition help
positioned, and moved for specific effects” (Young, establish the placement and relationship of all the
2017). Some aspects include positioning, movement, elements within the shot. A close up of two characters
framing, exposure, and lens choice. Here are some could indicate a close relationship while a long shot
technical terms for us to learn. could indicate distance. And even without the use of
such angles, the portrayal of space in the frame also
equates to the emotional/ psychological distance
between the characters.

Editing may in be in the form of graphic, rhythmic,


spatial, and temporal edits and is the “process of
choosing, manipulating, and arranging images and
sound” (Young, 2017). Films shot in modern times may
intentionally be in grayscale or sepia tone or edited to
be so to indicate a certain period or genre.
Films are usually not shot chronologically and so editing Typography organizes text and creates meaning
helps create the illusion that the movie is unfolding through the use of fonts to emphasize some content
naturally, without the intervention of the filmmaker. over the others. A love letter in a Chiller font would just
mean creepy stalker and not romantic lover, right? As in
Audio, which may be diegetic or non-diegetic, includes
this CM, certain fonts are only used for certain parts to
dialogue, sound effects, and music, and is the
emphasize their difference from each other and to
“expressive or naturalistic use of sound” (Young, 2017).
highlight a different aspect for your attention.
Diegetic sounds mean the sounds that occur within the
Color, too, is an important element, and is often
world of a narrative, as when a character happens to
referred to as the explicit convention when reading or
listen to the radio at one moment in the film. Non-
consuming any media product. It’s the color that first
diegetic sounds are the sounds that are superimposed
jumps out at us and with it are certain associations
on us, the background music that heightens the
designed to make us feel favorably or unfavorably
emotional effect of the film. We can’t hear where their
towards the media product.
source is on screen, as in voiceovers for documentaries
Visual composition for press and desktop publishing is
and film trailers.
called page layout. Considerations for this include
Certain kinds of music correspond with certain genres. space, hierarchy, images and size, color, the use of
Sometimes, a main character like James Bond has a white/negative space, text and text location, headlines
whole theme unto himself. Sound effects can also be and font size, audience expectations, and eye
used to emphasize certain elements as in the fizz of a movement across the page. Hierarchy for example
soft drink in an advert, or the canned laughter in most ensures that the most important parts of the page are
sitcoms. Most sound effects are also not captured larger than the less important ones.
realistically on field recordings or are drowned by other These elements of visual composition are also employed
noises in the periphery and so they have to be recorded in titles and credit sequences. For instance, the opening
separately and just added in the postproduction phrase sequence for the movie Catch Me If You Can involves
for crisp sound. Artists who engage in this kind of work long strokes of letters that extend towards the end of
are called Foley artists after Jack Donovan Foley who the screen, as if goading the viewer to “catch” those
pioneered this method. strokes. This sets the tone of the movie and the
expectations of the viewers early on.
Lighting, on the other hand, is the “manipulation of
natural or artificial light to selectively highlight specific Media Conventions
elements of the scene” (Young, 2017). It may include key point: Conventions are standards in using the media
quality, direction, source, and color. Lighting may also codes that act as rules governing behavior. They
be expressive and help define the space within a frame, become so by force of habit and social acceptance.
separate foreground from background, create textures,
Young (2017) asserts that “conventions are accepted
mold and shape, reveal or conceal.
ways of using media codes.” They are closely connected
Written Codes to audience expectations of a media product. Often, our
key point: Written codes are the literal language aspect reactions to a media product are shaped by conventions
of any media product. which may come in the form of story conventions, form
And because we are dealing with language, it also goes conventions, and genre conventions.
without saying that we are dealing with written codes Form conventions refer to the conventions inherent in a
that can either be printed or spoken. According to certain medium. Newspapers are expected to have
Young (2017), “written codes can be used to advance a headlines, news on the front page, an editorial page,
narrative” and “communicate information about a and other lifestyle sections in between, with the sports
character or issues and themes in the media product.” news at the back pages. Films naturally have title and
Spoken codes include dialogue and song lyrics while credit sequences. Games have tutorial modes. TV series
print codes include design, layout, and typography. have recaps at the beginning to update the viewers on
They may also employ buzzwords and catchphrases to the narrative. And so on.
make their product more memorable to audiences, such
as those used by adverts.
Story conventions are narrative structures that indicate Marshall McLuhan‟s “the medium is the message” still
cause and effect, character construction, and point of holds true. The way we present things in the media
view, and help the audience make sense of the products we produce contribute to the message we are
narrative. Most narratives follow the Hollywood sending. As media and information literate individuals
opening, development, and closure pattern or the who play the roles of audience, producers, and
equivalent of Freytag’s pyramid in literary narrative stakeholders all at the same time, it is our responsibility
structure: exposition, conflict, rising action, climax, to send the right message by using the appropriate
falling action, resolution. Flouting this convention mediums properly
deliberately such as using a disjointed timeline for the
narrative by moving back and forth between past and Summary
present usually indicates a certain significance in the What is the language of media?
narrative. The language of media is in the form of codes which are
Genre conventions, on the other hand, point to the signs understood and shared within a community. The
common use of tropes, characters, setting, or themes in ways by which producers of media use these codes are
a particular medium. For instance, as this BBC site says, called conventions when they are accepted by the
soap operas and other genres that appeal more to the audience and stakeholders, usually by force of habit.
emotions, there may be more close ups to focus on the How do the codes, conventions, and messages
expressions of the characters. Low angles that look embedded in media affect its audience, producers, and
intimidating to the audience are often used in action- other stakeholders? An unwitting audience of media
adventure films to make the character look larger than may be disadvantaged and manipulated to perform
life and therefore strong and invincible. A whip pan is certain behavioral patterns if unaware of these codes,
used to suggest panic and thrills in horror and action conventions, and messages. On the other hand, the
adventure films. In contrast, shots in documentaries are smart user of media will be able to exercise their critical
more stable and are often filmed using handheld or thinking and independence in full by making intelligent
shoulder-mounted cameras for ease of movement. decisions.
Tense dramas also have a slower pace of editing than
the more dynamic styles used in action adventure films. How is the medium the message at the same time?
Science-fiction and horror films, as a rule, use a lot more The medium becomes part of, if not the, message at the
special effects than the average afternoon drama. same time because by itself it is a statement, a choice
made by the content or media creator among other
These conventions exist because over time, the viewers choices available. Therefore, by virtue of being chosen,
have become used to them by force of habit and have it is assumed that it is the most compatible and most
come to expect them when consuming a media product. appropriate medium and hence will help deliver an
It does not mean to say, though, that every convention organic message to the audience.
we have is correct or should be continued. The male
gaze, for example, has been much decried in films.
Notice how in certain beach movies or chick flicks, the
camera, using the point of view of the typical
heterosexual male, focuses on the curves of the woman
or her other attributes, thereby objectifying or
sexualizing her. This is very much prevalent in the
testosterone-filled movies of the Pinoy action heroes
we see in the PBO channel. Again, conventions become
generally accepted by force of habit. Literacy in political
correctness will also go a long way in correcting these
conventions to advance an ethics that is fair to every
member of society, no matter how, and especially if
they are, marginalized.
MEDIA AND INFORMATION creation, including right to profit from others using the
work in specific ways without permission, or from the
LITERACY CM6 sale and performance of the work (Stony Brook
LEGAL, ETHICAL, AND SOCIETAL ISSUES IN MIL University, 2020). In simpler terms, you have all the
As with practically anything on earth, MIL also abounds rights in the world to protect, manipulate, and share
with legal, ethical, and societal issues that, if anything, your creative work with others.
has only gotten more complicated as we navigate this If you are going to check the back cover of the album of
new normal. Case in point, our synchronous sessions your favorite singer, you will find the words “ALL
are always recorded to facilitate easy review and RIGHTS RESERVED”, alongside the international symbol
instruction during the asynchronous sessions, yet it also for copyright, which is ©. This signifies that you, its
raises the question of proper use of such videos. listener, are only allowed to enjoy it, and not to produce
Consent to being recorded, consent to the video being it illegally, make money out of it, and worse, claim the
shared, and the general topic of consent in general is a songs on the album as your own, and sell it. The same
prickly issue that must at all times be managed with tact goes with a movie.
and sensitivity. Unfortunately for creators, this also applies to
This CM is a very long one because those issues require copyright. When a copyright expires after a certain
in-depth discussion and exchange of ideas. We will now amount of years has passed, all of the content the
fully discuss copyright and fair use, what constitutes creator produced will enter public domain. It is properly
plagiarism in academic works as well as knowing certain defined as a body of creative work to which no exclusive
netiquette to protect your virtual self. These issues also intellectual property rights apply.
feed into topics such as digital divide, internet There are certain conditions in which your song, story,
addiction, and cyberbullying which will be discussed in dance move, or poem will enter the public domain;
the next CM. their copyright will expire when:
a. the length of effectivity of the copyright is expired;
Copyright and Fair Use b. you willingly waived the copyright; In an effort of
key point: When we want to use the resources created sharing your content with others who may need the
by other people for personal or professional purposes, inspiration, you may choose not to file for a copyright of
there are certain conditions that we must meet to use your song, story, dance, or poem, and willfully
them freely, and without legal consequences. “dedicate” it to the public domain. This is called
Otherwise, we are criminally liable through plagiarism. copyleft. For some, it will mean losing potential to gain
monetary profit from their creations. For others, it is
This episode in music history is a prime example of how
simply a means for “free publicity” for their work, only
people may be forgetting the importance of respecting
to file copyright for their later works in the future, when
one’s intellectual property. It is generally defined as a
the public has appreciated their work.
category of property that includes intangible creations
c. the copyright has been forfeited by a ruling court in
of the human intellect (World Intellectual Property
the country where the content was created/distributed;
Organization, 2016).
Probably because the copyrights in other countries are
The key phrase here is intangible creations: whatever is
more stringent, or more lax, thus not coming to terms
a product of your mind, be it a song/poem you just
with your own copyright. Spain, Canada, Switzerland,
scribbled while sitting alone in the bedroom at 3 in the
and the Netherlands are some countries where
morning, a unique dance move you filmed and shared
downloading copyrighted material for personal, non-
on TikTok, a painting you have finished out of boredom,
commercial use is perfectly legal.
or a story you shared on Wattpad. Intellectual Property
d. copyright laws are inapplicable.
(IP, hereafter) is the umbrella term to which two of the
There are some creations that are automatically
major terms you are going to encounter belong:
categorized as public domain, i.e. free to use, because
copyright and fair use.
copyright laws did not exist at all when they were
created. The most prominent examples being classical
music, those from Mozart, Beethoven, Haydn, Bach, and
Copyright is defined as a legal binding that grants its
the others. This is a good explanation on why the poem
owner the right to control an intellectual or artistic
“Mi ultimo adios” is freely taught to students in their what you used?)
Filipino, and History classes, without the fear of Jose Fair use “allows a rather limited amount of copying
Rizal’s descendants chasing the tail of teachers for using without the copyright owner’s permission for specific
their ancestor’s work, since Rizal wrote his swan song in purposes” (Stony Brook University, 2020). Some
a time where Philippine copyright laws were totally purposes/intentions where fair use is dominantly
non-existent. (Uhm, were at war against the Spaniards, enforced are:
aint nobody got time fo‟ dat!) In the Philippines, a a. news and current affairs This includes commentary
certain creation will have its copyright expired and and criticism programs on all forms of media. When you
automatically enter the public domain when they reach hear your favorite newscaster or radio commentator
a good amount of years. Refer to the table with use a quotation from his favorite movie to launch a
condensed information coming from the Republic Act tirade against, say, a candidate running for Senator, the
No. 8293, formally known as the “Intellectual Property production company that created the movie cannot call
Code of the Philippines”. for copyright infringement, since it can be considered
fair use.
b. education-related materials Just like the example
regarding teaching “Mi ultimo adios” absolutely free to
students, any copyrighted material is constituted for fair
use if it is used for educational purposes. This includes
mentioning trademark names when teachers give
examples to students in, for instance, an
Entrepreneurship class. Your instructor may be regaling
you with stories on how doughnut brands like Tim
Hortons, KrispyKreme, and Dunkin‟ Donuts rose to their
respective successes. If you love watching
documentaries, and you see a lot of videos, songs, and
brand names used all throughout, they are technically
safe from copyright infringement, as it is generally
perceived that in good faith, those content are used to
educate people about a particular topic.
c. parody Parody is generally defined as a comedic
Of course, there are times that you will unintentionally commentary about a work, that requires imitation of
manage to use certain elements from an original the said work (Copyright Alliance, n.d.). Fair use, in this
content. As much as this is unavoidable, this is dictated case, guarantees protection against copyright
in legal parlance as the provision for fair use. Fair use is infringements as parodies imitate, mock, ridicule, or
generally defined as a provision of copyright law that even criticize items of pop culture. How do you think
allows the use of copyrighted work without permission the longest running comedy show in Philippine TV has
from the copyright holder under specific circumstances survived for so long imitating and mocking the
(Creative Commons USA, 2018). Avengers, historical action movies like “Gladiator” and
“300”, and anime series like Dragon Ball Z? Michael V.,
This means that you can use any copyrighted content et.al. will have to thank the concept of fair use for that.
from another person without asking for permission, d. sampling of music Just after the Vanilla
provided that you clearly state the intention of using Ice-Queen/Bowie fiasco, it has long been accepted
such content. Some of the circumstances that cover fair afterwards that hip-hop songs, or even songs from
use include: other music genres borrow some elements and mix
a. purpose (how will you use it?), them along with their original content. Prominent
b. degree/intensity of the original work used (how examples include the theme song of the Men in Black
much will you use?) movie franchise, which borrows elements from the
c. impact of the original work on the target 1970s disco hit “Forget-Me-Nots” by Patrice Rushen.
market/audience (what’s in it for those who will see Included in the agreement to avoid court litigations is
the fact that Rushen even agreed to have the chorus of of information in your own words, you must never
her song revised to accommodate the supernatural law forget to mention the source of that information.
enforcer theme of the Will Smith hit. Failure to do so constitutes plagiarism, whether by
accident or by blatant intention.
For your content to strike the clauses of fair use, three
b. composing an inadequate paraphrase of the original
(3) common guidelines must be met:
source If the authority that checks your outputs
a. the majority of the content must come from you,
observed that the original source is still dominant than
with the copyrighted material only constituting
your own words, this also constitutes to plagiarism. You
inspiration, mention, sampling, and interpolation;
must take advantage of the liberty that paraphrasing
b. you must give credit to the creators of the
gives you.
copyrighted material; for instance, if you are going to do
c. linking information to an incorrect/false/made-up
a short film for an indie film competition, and you
citation Make sure that you get all the basic AND
borrowed some elements from a particular movie, it is
correct details needed to make a citation, or else, when
imperative that you mention the creators of the
the authority checking your output does check the
material you borrowed; and
references you used, and it led them to a dead link, or
c. you must assure that your material is for
even a non-existent resource, you will be in big trouble.
noncommercial use only; you are not allowed to sell or
And no, we do not cite fictional characters in academic
make other means of profit from the creation you
texts. Save that for your Facebook statuses, and
conceived with the copyrighted material along with it.
Instagram photo captions.
Plagiarism 4. Self-Plagiarism You read it correctly: you can dupe
key point: Using someone else’s work without proper yourself in terms of your own outputs. Self-plagiarism is
attribution and calling it your own is a gross violation of committed by submitting the same output you had in a
ethics and standards of academic honesty, not to previous course to a current course, again without prior
mention intellectual property rights. acknowledgment. For instance, you are asked by your
facilitator in Media and Information Literacy course to
1. Verbatim plagiarism From the Latin “word”, this is compose an essay about plagiarism. You remembered
the fundamental kind of plagiarism that the majority that your Research instructor also had the same task
commit, student or professional alike. It is simply last year, and your essay got an almost perfect score.
copying each and every single word from an original Hoping that the facilitator won’t notice and knowing
source, and “pasting” it on the new content, passing it that it will take quite an effort to write an essay similar
off as an original. This is also known in other references to what you already did, you submitted that same essay
as cut-paste plagiarism, and copy-paste plagiarism, due to your MIL facilitator. Self-plagiarism may not just
to the ease with which you can do this kind of involve whole outputs. When you copy parts of an
plagiarism through the computer. output that you made previously, and used it in a
2. Mosaic plagiarism It is the act of compiling parts of current output, you’re cheating on yourself, as well as
different resources, changing some of the words to disrespecting your craft. What academics do is to cite
accommodate the topic, then combining them into one their own paper, no matter how arrogant it may seem.
single new content, much like stained glass mosaics in The more pressing issue here is academic honesty and
churches. Compared with copy-paste plagiarism, mosaic integrity.
plagiarism is easier to detect, because the major
giveaway of outputs plagiarized in this manner is the Netiquette
inconsistency of one sentence with another, especially if key point: When engaging with people over the
not proofread well before submission. internet, we must practice certain rules and regulations
3. Misattribution Plagiarism This can come in various which are universal to ensure a smooth flow of
forms and is one of the most dangerous kinds of information and to show respect for other people.
plagiarism, too. You can commit misattribution
Before Friendster, Multiply, Facebook, Twitter,
plagiarism by:
Instagram, and Reddit, one of the places on the internet
a. leaving an uncited paraphrase/quotation as discussed where people can converge and share a piece of their
in an earlier CM, even if you rearranged a certain piece day (or their whole life) is through the usage of online
fora. An online forum is a community in which people fun. Unless you are allowed to be informal, you must
on the internet (called “members”) communicate with set your “default” tone on the internet to formal.
each other through posted messages (Vbulletin, 2020). Think before you click.
It is also known as an online bulletin board, paying - This is self-explanatory and is highly repeated on
homage to the old school way of getting noticed within campaigns regarding netiquette. If you think there
one community by posting advertisements, are consequences that you can’t be responsible for,
announcements from the local government unit, then don’t post it. It’s that simple.
- This goes the same with the resources that you
missing person notices, and even personal information
access. Consider the safety of the website/resource
on a large bulletin board usually posted in a public
before clicking it.
space, in an attempt to make a match with someone Secure your privacy.
else in the same community, such as a pen pal or a - This is one of the most highly ignored conventions
meet-up for a physical date. Compared to chat rooms regarding netiquette. Always change your password
(such as ones on Yahoo! Messenger, ICQ, and on all online accounts every now and then. It is
Blackberry Messenger) online fora encourage people to recommended by IT experts that you change your
write long messages to liven up an online conversation passwords every 90 days.
called a “thread” (yes, this is where the internet jargon Respect a netizen as you would a “real” one.
came from) for others to contribute as well. - Remember, writing is more permanent than speech
And compared to chat rooms which can get raucous and does not contain nonverbal cues. Being polite
with the many codes, emoticons or emojis, and and courteous to people you communicate with on
acronyms present, online fora has certain rules for all the internet will never scratch your ego.
members to comply with. One common rule is the Wait for your turn, otherwise, excuse yourself
during arguments. - Especially when you are
avoidance of consistent use of uppercase letters
engaging with multiple persons online, as much as
(colloquially termed as “all caps”) when communicating
possible, speak only when you are addressed directly.
with someone. Violate these rules, and you are kicked Avoid barging in a conversation of two other persons
out of the thread, or worse, “banned” from the whole as this will give them an impression of you being an
forum itself attention seeker.
The “all caps” rule is one of the earliest forms of Don’t…
netiquette that has transcended the age of e-mails and Flame other people who don’t share the same line
online fora into the age of social media and instant of thought as you. - “flaming” is the term used for
messaging. etiquette that users of the internet must online communication which means to attack the
subject themselves to maintain a good, and respectful person making the argument, and not the argument
environment of sharing and distributing information in the person laid out. This is the online version of
the World Wide Web. Some of the general netiquette argumentum ad hominem when holding academic
that we commonly practice have been condensed in the debates. It is safe to say that if you are the kind of
table below: internet user who loves to flame other people, you
simply don’t know how to argue with others, and you
Do’s… can’t accept defeat, criticism, and rejection IRL. The
internet, therefore, is not for you.
Maintain relevance, appropriateness, and tact. Send a barrage of unnecessary messages. - You may
- Especially in online class, you must remember that be familiar with this in another term: spamming. It is
you are engaging with people whose academic and highly unethical for you to send a barrage of
social standing is unknown to you. Avoid talking as if messages that is of no use and interest to the
you’re best buddies with someone whom you don’t receiver, not to mention that it also takes up a lot of
know. space on their email accounts and chat windows. You
- Stick to the topic. It is unethical to segue into surely don’t want to wake up with a lot of
another topic without finishing the previous one. notifications on your phone, only to find out that they
That is plain disrespectful and will make the user feel are about nonsensical stuff.
irrelevant in contributing information within the Talk in straight uppercase letters (i.e. all caps). -
online circle Writing your messages on the internet in all caps is
- There will always be time for memes, jokes, and the online equivalent of shouting and yelling. And
even if your intention with using uppercase letters is
to gain attention, it does not work that way, not to
mention that words consistently written in uppercase
is also a pain to read.
Share critical personal information. - Unless you
want to follow the philanthropical footsteps of Willie
Revillame and Oprah Winfrey, NEVER share any of
the following critical information regarding you and
your person:
-- full name
-- credit/debit card numbers
-- birthdate
-- present address
-- present school (for students); present workplace
(for professionals)
-- similar information regarding your
parents/guardians, siblings, and other relatives This
information can be potentially used for identity theft,
as well as credit card scams.
Record/Take a screenshot of your conversations
without the consent of the other party/ies. - This is a
blatant violation of other people’s internet freedom.
A lot of incidents regarding identity theft (e.g.
duplicate social media accounts), and cyberbullying
(e.g. taking a candid screenshot of your friend and
posting it online for others to make fun of) root from
this violation of netiquette. If you don’t want your
own face to end up as the next trending meme, don’t
do the same to your friends, family, and others.

Much has been said regarding netiquette, but to sum it


all up, just take note of this Latin phrase: Memento
publicum. Remember that you are in public. What you
say, and how you present yourself online is regarded
nowadays as constitutions of your digital self. We must
be careful with how we present ourselves digitally
because others may take it as being one with our
personal, true selves.
MEDIA AND radio and television; youth supporting candidates who
campaign over social media;
INFORMATION LITERACY - between geographical locations The nightly news
focuses more on events that happen in the NCR and
CM8 Luzon, and less in Visayas and Mindanao;
- between geopolitical statuses The amount of
LEGAL, ETHICAL, AND SOCIETAL ISSUES IN MIL American-related news shown in the People’s Republic
Virtual selves are a curious thing. From the avatars we of China (especially in the state-run network CCTV), and
construct to the roles we play in role-playing games the amount of Chinese-related news shown in American
(RPGs) to the profiles we create online; we leave traces households (in their Big 4 stations: ABC, NBC, CBS, and
of ourselves; we leave a print of our virtual selves Fox);
online. However, whether these virtual selves are - between genders According to a 2018 report, males
wholly equivalent to our offline selves is another matter dominate the knowledge of using mobile devices for
entirely. And this is never more apparent than in the gaming, looking for jobs, while females are left with
issues we are going to discuss for this CM: issues of using the basic functions of their phones such as making
digital divide, internet addiction, and cyberbullying. phone calls, and the calculator application.
b. Access and Usage of Technology - capability of using
Digital Divide a particular software/application (you know how to cite
Key point: Information, and the various technologies references in Microsoft Word with ease using the
that provide access to such, is unequally distributed to References toolbar, while your classmates still cite
people, especially within a minority, a country, or a theirs manually), - access to technological tools (such as
specific community due to various factors. Equality on the smartphone example earlier), - quality of internet
the internet is, at this moment, an abstract idea. connection (South Koreans are cruising on 27mbps
average internet speed, while Filipinos are tippy-toeing
Initially conceptualized by the American psychologist on a 6mbps average speed [as of 2017])
Lloyd Morrisett, the concept of a digital divide is
defined as an uneven distribution in the access, use of, There are many other divisions to consider when
or impact of information and communications discussing how the world is still imbalanced in terms of
technologies between a number of distinct groups access to information and usage of the different
(National Telecommunications and Information technologies to access such information. Seeing and
Administration, USA, 1995). When your friend knows feeling a digital divide is a pressing issue because it
how to operate an iPhone (with an iOS) and a Samsung promotes inequality among people, groups, and
Galaxy phone (with the latest Android 10 installed in it), institutions. In terms of access to information, a digital
and you’re stuck with a hand-me-down Android FroYo- divide can turn into a source of discrimination among
powered smartphone, then this is an apparent division peers, superiors, and other people we may encounter to
of your respective capabilities to acquire your tool to engage a conversation with. Most of us are ashamed to
access the same information you both have within admit that we still read books in the library to get
reach. information out of the teasing and discrimination we
As scholars in the field of ICT are divided on what really may get from our friends who have a steady access to
constitutes a digital divide, the following divisions are the internet to look for sources for their Review of
those considered to be the most apparent in the Related Literature and Studies in your latest Research
Philippine context. project. After all, they may argue, why spend time
scouring dusty, outdated hard bounds and paperbacks
a. Access to Information - when you can simply google it and wait for a few
-among socio-economic groups This is manifested in milliseconds for the results?
online news portals such as ABS-CBN News website,
which maintains a separate, “tabloidized” news portal In a broader scope, the digital divide is a reflection of
called Patrol.PH, which is targeted for the working class the progress and decline of the society a person belongs
- among socio-political groups Elderly citizens to. A child from the far-flung provinces who has only
supporting election candidates they frequently hear on tried using a computer unit running on a CRT monitor
and a Pentium 3-powered CPU may be alienated with If you answered “yes” to at least five of the criteria, you
the sight of college students in the city carrying laptops need to get your internet intake regulated immediately.
running on AMD Ryzen processors, and paper-thin Because just like an addiction to illegal substances,
Apple MacBook laptops. This is also a good reason that tobacco, and alcohol, internet addiction (specifically
people from foreign countries lament the monthly rates addiction to online games and social media) is being
we pay to the top telecommunications companies for a pushed by psychologists and psychiatrists to be
measly 2mbps broadband connection. considered a mental-behavioral disorder, next to
With the sudden shift to full online modalities for gambling disorder.
learning during this pandemic, the business sector and
There is hope, fortunately, for those who can’t stop
other institutions are already trying to address this
immersing themselves in the AMOLED screens of their
divide. Gaps are still present; nevertheless, it is hoped
smartphones, and the 16-inch screens of their laptops.
that soon, the on/offline status that we have will be by
The very first thing that is recommended is to talk with
choice and not by connectivity or access issues.
someone whom you can trust. This is for two reasons:
Internet/ Online Addiction 1. to discuss and acknowledge that you are having a
key point: If not regulated properly, using the various problem with spending too much time on the internet,
capabilities of the Internet can lead to an addiction that and 2. to implicitly cut off some screen time and
may be hard to regulate. immerse yourself once again in the real world.
Internet addiction, a.ka. online addiction is generally
Another way to curb internet addiction is to allot
defined as the excessive use of computers to the extent
specific hours in which to engage yourself in physical
that it interferes with daily life. Simply put, if using the
and mental activities, such as trying out a sport, solving
internet is what dictates how you get by your day, the
puzzles, engaging in a specific hobby that will develop
way you use it may be considered problematic
skills such as creativity and artistic freedom. Enrolling in
Dr. Keith Beard (1995), an expert on internet addiction,
skills-based courses is also a good solution to improve
proposed a characteristic list which is answerable by
your wellbeing.
“Yes” or “No”. On your own, you may want to check
these characteristics to see whether you fit the bill. If you still find yourself going back to your old ways, it is
time to get professional help, just as a person
Do you feel preoccupied with the internet?
experiencing anxiety, depression, or any life-hindering
-- Do you think about what you did there yesterday?
mental health condition will do. Always remember that
-- Do you anticipate the next online session you will
admitting your weaknesses will never make you less of
have?
a human being: admission is the first step to recovery.
Do you feel the need to use the internet with increasing
Because after all, how can a doctor treat a patient if the
amounts of time to achieve satisfaction?
patient won’t tell about the pain?
Have you repeatedly made unsuccessful efforts to
control, cut back, or stop Internet use? Cyberbullying
Do you feel the following when attempting to cut key point: Stepping on someone else’s rights or
down/stop internet use? -- restlessness -- moodiness -- harassing them using digital means can lead to severe
irritability – depression consequences.
Do you stay online longer than originally intended? Cyberbullying. Experts generally define cyberbullying as
Have you jeopardized/ risked the loss of the following the act of harassment or overpowering another person
because of the internet? -- significant relationship through digital means (such as social media).
(family, friends, coworkers, and/or partner) -- Cyberbullying is one of the most pressing concerns in
job/career opportunity -- studies/educational schools and households around the world and comes in
opportunity various forms and functions.
Have you lied to family members, a therapist, or others Depending on the intention that a certain perpetrator
to conceal the extent of involvement with the internet? of cyberbullying wants to achieve, there are many ways
Do you use the internet as a way of escaping problems to execute it, some of the most common are:
or relieving a dysphoric mood (such as helplessness,
guilt, anxiety, and/or depression)?
a. cyber harassment This is when a perpetrator attacks word. Cyberbullying can also have drastic effects on
a person in a constant basis with the objective of their socialization skills, developing a sense of social
instilling emotional harm, fear, and lack of security anxiety, doubting the intentions of the next person who
within the victim’s online social circles. The attacks can will approach them.
come in the form of: i.) unnecessary messages (such as
One of the things that you should do immediately when
threats and ransoms) ii.) posting of unnecessary media
encountering a cyberbully is to ignore them. Chances
related to the person, with the objective of exposing, or
are that the person is merely trolling you and gauging
shaming, and/or making fun of the victim, and/or iii.)
whether you will bite into the trap, causing the
enticing the victim to do something for the
cyberbully to attack you more, until you can no longer
perpetrator’s benefit (such as cybersex, scamming,
fend off, and you start feeling insecure about yourself. If
fraud, etc.)
there is ever an appropriate time to say the children’s
b. cyber stalking This is when the perpetrator follows
story adage: Do NOT feed the trolls! Do not serve them
the trail of the victim through acquiring their personal
anything that they can use against you in their next
information, with the intent of harming them using the
campaign of cyberbullying, thus discouraging them from
acquired information. This is prevalent among
attacking you.
celebrities, with perpetrators going through their
personal social media accounts and the cloud storage The internet has a hive mind and will usually latch on to
devices of their mobile devices during a mass hacking of whatever is trending at any given moment. Therefore,
accounts in 2014. breaking the chain of cyberbullying also includes not
c. trolling This is an intentional form of bullying. To troll giving any fodder for trolls. No likes, no reacts, no
someone is to blatantly attack someone whom you are comments whatsoever. If you must take action, do so
not in good terms with or a random person for the through proper channels.
satisfaction of getting to the nerves of that person,
eliciting unsuspecting replies and rebuttals, only to be
met with more intentional attacks. Flaming, as
discussed in the lecture regarding netiquette, is an
avenue of trolling.

What makes cyberbullying bothersome and more


dangerous than conventional bullying is the fact that
most of the time, we cannot identify the perpetrators,
and worse, we have no options of responding to or
fighting back the cyberbully, thinking that it will not
affect them at all if we did.

Who are at risk of cyberbullying? Every single one of us,


especially when we have constant access to the
internet. It has been pointed out by experts that people
subject to cyberbullying may have lower self-esteem,
increased thoughts of committing suicide (formally
called as “suicide ideation”), and various emotional
responses such as getting scared, frustrated, angry,
anxious, and depressed (Hinduja & Patchin, 2009).
Doctors even mention that in a physiological point of
view, victims of cyberbullying can get less sleep, thus
impacting their physical well-being (American
Osteopathic Association, n.d.). Students at school may
feel intimidated (just like the case of Salvosa) to go to
school and attend their classes, with the fear of being
prejudiced and jeered at with their every move and
MEDIA AND
political risk and increase good governance- conditions
that are important for robust economic development.

INFORMATION 2. Education Media plays an important role in learning


and education; it continues to transform and help the

LITERACY CM9 sector of education especially in this time of pandemic.


Since many schools from around the world started to
offer remote learning were students are allowed to
OPPORTUNITIES, CHALLENGES, & POWER OF MEDIA & enrol and study even without leaving their homes,
INFORMATION teachers and students heavily rely on different forms of
From the lessons that we have discussed in the previous educational media such as those which are accessible
course materials, we can deduce that media is through mobile phones in order to continue the delivery
undeniably a powerful tool that functions to inform, of learning According
entertain, educate, and influence people. to the recent statistics, the educational mobile apps are
As already mentioned, media and information can the third most frequently downloaded applications on
greatly influence people’s lives, and this influence may the mobile phones with the current rate at 8.47%.
either be positive or negative—it could either be an Below is another recent statistic showing the specific
opportunity or a challenge. An opportunity that education apps most frequently downloaded for June
functions to strengthen and enrich the connections 2020.
between citizens and organizations comprising the In this generation where the usage of new media or the
economy, education, social, and political parties, or a internet is really on its peak, teachers and students are
challenge that poses risks, threats or the negative given the opportunity to access unlimited media, thus,
effects to people’s lives. In this course material, we will they have the ability to acquire unlimited information
discuss both the opportunities and challenges of media and knowledge at their fingertips.
and information. 3. Social Media of today is playing an outstanding role
Challenge - A challenge is something new and difficult in creating and shaping of public opinion and
which requires great effort and determination. strengthening of society. Media is the sword arm of
Opportunity - A time or set of circumstances that makes democracy. Media acts as watchdog to protect public
it possible to do something. interest against malpractice and create public
awareness.
Opportunities in Media and Information In addition, at this time, media (specifically social
Key Concept: The New Media or the Internet provides media), becomes as essential as our daily needs. Any
great opportunities to improve life for all users. It has website allows social interaction which is considered a
positive effects on economy, education, society, and social media sit, including social networking sites such
politics as Facebook, Myspace, Twitter, gaming sites and Virtual
1. Economy Media and information has a great impact works, video sites such as Youtube, and Blogs. This sites
towards the economy. It improves the efficiency of the give entertainment and communication and have grown
economy by providing economic actors more and better in recent years.
information which will help them make decisions that
will improve economic stability 4. Politics The political landscape has changed quite a
Economic actors need accurate and timely information bit in the last couple of decades. The internet has
to allocate their resources efficiently. Business owners, played a large role in this transformation. Social media,
investors, and other groups also relies on media to in particular, is now a serious factor in political
know the needs and demands of the people. campaigns and in the way people think about issues.
Candidates and their supporters constantly post their
A free and independent media also provides views on Facebook and Twitter. Each party has its own
information and monitoring to the economic policy pages, from which it broadcasts propaganda and
development process leading to more effective requests for donations. Let’s look at some of the leading
economic policies. Playing their role and function in a ways that social media influences politics today
democratic society as a watchdog can also reduce
1. News Around the Clock One of the ways that social personally identifiable information, banking and credit
media has transformed politics is the sheer speed at card details, and passwords.
which news, poll results and rumors are shared.
3. Virus dissemination. Virus is a program which attach
Whereas in the pre-internet days, people had to wait themselves to the computer or file and then circulate
for the next newspaper or TV news show to get the themselves to other files and to other components on a
latest information, online news is a 24/7 phenomenon. network. They usually affect the data on the computer,
2. Demographics and Targeting Targeting is used either by altering or deleting it.
throughout the advertising industry to make sure that 4. Cyber stalking is the use of internet or other
ads and messages reach the right audience. Politicians electronic means to stalk someone. It is online
do this as well. In the age of social media, politicians and harassment and online abuse. Mostly cyber stalking
people running for office are able to target their involves following a person’s movement across the
campaigns. internet by posting threatening messages to the victim
3. Direct Interaction With Politicians One of the or by entering the chat rooms frequented by the victim
positive effects that social media has on politics is the or by constantly bombarding the victim with the e-mails
opportunity for voters to interact more easily with etc.
candidates and elected officials. Traditionally, if you 5. E-mail Spoofing happens when an e-mail that
wanted to meet a politician or candidate, you’d have to appears to originate from one source was actually sent
attend a live event. Not everyone is able to do this. With from another source. This can also be termed as e-mail
modern technology, it’s now possible to attend virtual forging.
events where you can participate in live streaming
UNESCO also presented several challenges and risks
events and interact with politicians and candidates.
related to online content which are adapted from Youth
Challenges in Media and Information Protection Roundtable Tool Kit – Stiftung Digitale
The Internet provides a wealth of content for all groups Chancen 2009
of users. With almost everyone having their mobile
1. Age-inappropriate content such as adult
phone with various functionalities and access to the
pornography might especially harm younger children
Internet, the media and information that strengthens
when exposed to it unintentionally. The risk of facing
the connections between citizens and organizations also
age-inappropriate content can result from the user’s
poses threats, risks, abuse, and misuse.
own conduct when searching for it deliberately, as well
Cybercrime According to Technopedia, cybercrime is as stumbling across it without intending to. Special
defined as a crime in which a computer is the object of attention should be given to content that is not illegal in
the crime (hacking, phishing, spamming) or is used as a general but might harm younger users.
tool to commit an offense (child pornography, hate 2. Infringement of human rights / defamation. In the
crimes). Cybercriminals may use computer technology anonymity of the web, propaganda against certain
to access personal information, business trade secrets population groups or individuals can easily be
or use the internet for exploitative or malicious widespread. Also, defamatory content is harmful to
purposes. children and young people whose opinion might be
influenced by misleading information.
There are different types of cybercrime:
3. Copyright infringement is a risk mostly related to the
1. Hacking is the most common type of cybercrime
conduct of users themselves. Irrespective of whether a
committed across the world. Hacking is a crime which
copyright has been infringed deliberately or
entails cracking systems and gaining unauthorized
accidentally, the infringement is seen as fraud by the
access to the data stored in them. Hacker is a person
holder and puts the violator at risk of penalty.
who breaks in to a computer system.
4. Bullying. Various types of bullying seem always to be
2. Phishing is a cybercrime in which a target or targets
part of people’s lives. Bullying one another is certainly
are contacted by email, telephone or text message by
simplified by the Internet due to the anonymity
someone posing as a legitimate institution to lure
provided by the medium. Children and young people in
individuals into providing sensitive data such as
particular risk being both victims of bullying and
offenders. Hence bullying is related to one’s own
conduct as well as to the conduct of others.
5. Identity theft. Getting hold of, and making use of, Curriculum Guide by DepEd). These are people who
other people’s electronic identity (e.g. user name and works behind all types and forms of media such as text
password) with the intent to commit commercial or media, visual media, multimedia, etc., (which we are
other fraud and to benefit from it is called identity theft. going to talk about in the next course materials) in
Identity theft is a growing risk as the number of virtual propagating information and exchanging of knowledge.
identities is increasing with the number of people online
People media can be classified into two types, (1)
and particularly those using personalized services
people as media and (2) people in media.
Power of Media and Information PEOPLE AS MEDIA are individuals that serve as channels
of information. They are the media itself. The person
The power of media and information revolves on its
serves as a medium for another person to learn or
influence. Remember that while media strengthens and
acquire a new knowledge. Traditionally, this is limited to
enriches the connections between citizens and
folk media, writing, or creating a media artifact but with
organizations, it can also manipulate and pressurise the
the advent of social media, individuals have been
society, controlling it in negative ways.
empowered to not just create media artifacts but to
This is exact reason why having the capability to analyse give feedback, edit and add on to the media artifact.
and evaluate media and information is crucial. One People who are media themselves include the
should possess essential skills and competencies that following:
will allow them to engage with media and other a. Opinion Leaders: They are individuals or
information providers effectively, so that they could organizations that are able to influence people by their
avoid being manipulated or controlled by the vast opinion. They are ones that the opinion receivers
information present in our society. consider credible and hold high regard for in that
particular area. Take for example, a member of your

MEDIA AND circle of friends who is the love guru among you. So,
imagine people who have professional backgrounds in a

INFORMATION specific field where their advices are taken seriously


b. Citizen Journalist: These are people who are not
professional journalists but who disseminate
LITERACY CM11 information using Web sites, blogs, and social media.
They are using tools of the modern technology and
PEOPLE MEDIA & TEXT INFORMATION AND MEDIA internet to create augment or fact-check media on their
PEOPLE MEDIA own or in collaboration with others
Just like the people aforementioned, social media c. Social Journalist: These are journalist that uses social
influencers – specifically YouTubers’ vlogs have been media to make their content available to more people.
our go-to activity to spend our long afternoon. Indeed, It consists of a hybrid of professional journalism,
in the virtual world especially now that we are in the contributor and reader content. Its format focuses on
pandemic, a lot of people really showed interest in the involvement of the society, engagement of
creating contents as social media influencers that cover audience, verification and collection of news, data and
their life styles, hobbies, family interests, and love analysis, and relationship-building. It commonly takes
stories. Famous YouTubers can be called now as place in open publishing platforms such as Twitter and
celebrities because of the million subscribers, thousand WordPress.
viewers, and back-to-back sponsorship as product d. Crowdsourcing: It refers to the collection of
endorsers and others. Truly, social media has information based on opinions and preferences from a
empowered almost everyone to be channels of large group of people answered through the internet,
information thus becoming medium of communication. social media, and/or smartphone applications. People
With people’s influence in different forms of media, we related to crowdsourcing activities are sometimes paid
consider them as people media. People media refers to as freelancers, while others do small tasks voluntarily.
people that are involved in the use, analysis, evaluation PEOPLE IN MEDIA are individuals that are working
and production of media and information. The best behind the forms of media. They use forms such as text
simple example is a teacher in a classroom. (MIL media, visual media, multimedia, etc. in redistributing
information and sharing of knowledge. They are media 2. Micro-blogging – Twitter, Instagram
practitioners that share their expertise or first-hand 3. Special interest networks – Linkedin, Pinterest
experience of events. These are the journalist 4. Media Sharing – YouTube, Flickr
themselves. 5. Collaborative news -Reddit, Waze,
a. Print Journalist: It refers to a writer and/or reporter 6. Discussion Forums – Google Groups
who work for newspapers and magazines. They gather 7. Group buying/merchant sites – OLX, Groupon,
and analyze facts from newsworthy events through Dealgrocer
conducting interviews, investigation, and/or 8. Virtual worlds – Farmville, World of Warcraft,
observation. Secondlife, Minecraft
b. Photo Journalist: Someone who photographs, edits, ADVANTAGES AND LIMITATIONS OF USING SOCIAL
and displays images to tell a narrative. They are MEDIA
journalistic professionals who possessed skills in
interpreting and communicating through photographs.
c. Broadcast Journalist: It talks about someone who
conducts research, investigation, and present news and
current affairs content in television, radio, and in the
virtual world. The goal is to present information in a
balanced, accurate, and interesting way through
different forms of media such as news bulletins,
documentaries, and other real-life programs.
d. Multimedia Journalist: This refers to a storyteller
who works across many dimensions combining text or
print, photographs, sounds, videos, and graphics in
presenting information.

CHARACTERISTICS OF PEOPLE MEDIA


1. Tech Savvy: They should be proficient in the use of
technology.
2. Credible: They are able plausible and reliable.
3. Flexible: They know how to use a range of technology
and are able to change or to do variety of tasks.
4. Charismatic: They catch the attention of different
people as part of their audience.
5. Updated: They are aware of the latest events in the
society.
6. Articulate: They are able to express themselves easily
in clear and effective language
As social media enabled people to be the medium of
communication, here are characteristics of social media
that help embody people media.
CHARACTERISTICS OF SOCIAL MEDIA
1. Individualized, builds profiles (includes personal
details, pictures, likes)
2. Connects with friends and people (includes referrals
by other friends or by the site itself)
3. Uploads content in real time
4. Enables conversations (both private and public)
5. Provides tracking (history and threads)
FORMATS & EXAMPLES OF SOCIAL MEDIA
1. Relationship or Social networks – Facebook
Text Information and Media expression. This fusion of art and writing is called as
key point: Text is usually compared to pictures and typography.
images as better visual information. Typography is the art of arranging text based on
A text is a simple and flexible format of presenting typefaces, point size, line length, and spacing. Its
information or conveying ideas whether hand-written, purpose today varies depending on the tone, mood, or
printed, or displayed on-screen (MIL TG by CHED). As theme of the setting where it will be used
written codes advances our narrative, text is a powerful Here are the things that you need to know in order to
tool in disseminating information, providing direction, make use of text as visuals in media and information:
and giving suggestions. Thus, Text Information and Typeface or known as font, font type, or type refers to
Media in general refers to materials, programs, the representation or style of a text in the digital
applications, and the like that teachers and students use format. A typeface is usually comprised of alphabets,
to formulate new information to aid learning through numbers, punctuation marks, symbols and other special
the use, analysis, evaluation, and production of characters. When fonts are installed in the computer,
alphanumeric characters and symbols. they usually come in file formats such as True Type Font
Text is available in different forms of media may it be (.ttf), Open Type Font (.otf), etc. In the absence of
formal such as what we see on news articles, published images or drawings, text is the easiest way of
books, newspapers, magazines, advertisements, communicating to your audience. The use of various
research works, etc. or informal such as blogs, personal font types can express different emotions or meaning
e-mails, SMS or text messages, online messengers, just like what we agreed on written codes.
social media platforms, etc. Types of Typefaces: Serif - connotes formality and
A. Formal text-based materials are created and readability in large amount of texts. This font is usually
distributed by established institutions such as publishing used for the body text of books, newspapers, magazines
companies, news agencies, etc. These also undergo a and research publication. Also, serif fonts give a classic
rigorous process of editing or evaluation and or elegant look when used for title or heading.
Examples: Times New Roman, Garamond, Baskerville
are usually governed by censorship of the state.
B. Informal text-based materials come from personal Sans serif - brings a clean or minimalist look to the text.
opinions or views on different issues, processes, etc. This font is used for clear and direct meaning of text
Text can vary in its length. It can be as short as a single such as road signage, building directory or nutrition
sentence or phrases such as the catchphrases that you facts in food packages. Also, sans serif fonts give a
are already familiar with up to news articles or modern look and is used primarily in webpage design.
investigative reports. Regardless its length, a text is Examples: Arial, Helvetica, Tahoma, Verdana, Calibri
carefully written with the purpose of sending an Slab serif- carries a solid or heavy look to text. This font
important message to your target audience. can be used for large advertising sign on billboards.
Examples: Rockwell, Playbill, Blackoak
In our exposure to text media and information, we can
Script- draws much attention to itself because of its
either be a consumer or a producer of content. As a
brushlike strokes. This must be used sparingly and not
consumer, these are the questions that you need to ask
with regards to the content of text media and information:
to be used in large body text. This font is usually used in
• Who or what institution is sending this message? • What wedding invitation cards or other formal events.
techniques are used to attract and hold attention? • What Examples: Edwardian, Vladimir, Kunstler
is the language used by the writer? • What views are Display or decorative- caters to a wide variety of
represented? Are they balanced? • How might the emotions (such as celebration, fear, horror, etc.) or
message be interpreted in different ways? • What is themes (such as cowboys, circus, holidays, summer,
omitted, slurred or added in the message? kiddie, etc.) Examples: Chiller, Jokerman, Curlz MT

Text as Visuals Design principles and elements:


The world can never be understood without letters. 1. Emphasis - refers to the importance or value given to
These letters are used to send a message into different a part of the text-based content. When trying to make a
expressions such as love, hatred, or other emotions. point or highlighting a message, you can make the text
These letters also developed as an object for art bold, italicized, have a heavier weight, darkened or
MEDIA AND
lightened (depending on your background color) or
enlarged.
2. Appropriateness - refers to how fitting or suitable the
text is used for a specific audience, purpose or event. In
the creation of text-based content, make sure that the
INFORMATION
selection criteria (tone, style, purpose, clarity) is
followed. As for the choice of typefaces to be used,
LITERACY CM12
refer to the discussion of the characteristics of the VISUAL AND AUDIO INFORMATION AND MEDIA
fonts. When it comes to large body text, the font should
be clear enough to read Together with the text information and media that we
3. Proximity - refers to how near or how far are the text discussed in the previous course material, another
elements from each other. When two things are closely media and information resources that people media use
related, we bring them close together. Otherwise, we is the visual information media. As consumers of media
put text elements far from each other. For example, the and information, we cannot deny the fact that most of
main title and subtitle are usually placed close to each us get more interested looking at visual contents
other. compared to plain text.
4. Alignment - refers to how the text is positioned in the Today, the power of visuals is a key content, and should
page. This can be left, right, center or justified be a valuable part where we exert our effort in
5. Organization - refers to a conscious effort to organize producing information. According to the Digital
the different text elements in a page. Organization Information World, storytelling and data visualization
ensures that while some text elements are separated are the need of the hour. Stakeholders focus more on
from each other (based on the principle of proximity), showing instead of telling making visual content
they are still somehow connected with the rest of the trending and rises higher in terms of use and affectivity.
elements in the page. When there are many elements Also, consumers these days crave visual content that
needed to fit in a page, start by creating a framework or greatly impacts the overall evaluation of material.
a compartment for the elements. Divide the space by
creating lines across the page, making it
Studies show that:
look like a cabinet with various space sizes. Once you a. 90% of the information transmitted to the brain is visual
are done compartmentalizing, you can place the b. 80% of people remember what they see
different text elements on the boxes. c. Visual are processed 60,000 times faster in the brain
6. Repetition - concerns consistency of elements and than text
the unity of the entire design. Repetition encourages d. 40% of people will respond better to visual information
the use of repeating some typefaces within the page. than text
When several typefaces are used on a page, it might Visual Information and media refers to materials,
distract the audience and fail to communicate what you programs, applications and the like that teachers and
want them to get from the content. To strike a balance, students use to formulate new information to aid
do not also use just a single typeface for a visual design learning through the use, analysis, evaluation and
product. production of visual images (MIL Curriculum Guide by
DepEd). Types of visual information and media includes
7. Contrast - creates visual interest to text elements.
photography, video, screenshots, infographics, data
Contrast is achieved when two elements are different
visualization (charts and graphs), comic strips or
from each other. When you place a white text on a very
cartoons, memes, visual note-taking, etc. Visual media
light yellow background, contrast is not achieved and
produced by organization, schools, government, and
the text will be difficult to read, but when you put a
established media/publishing outfits are considered
white text on a dark brown background, contrast is
formally produced; otherwise, they are informally
created. Contrast can be achieved in various ways, by
produced.
joining the following elements: large font with a small
This visual information and media main purpose are to
font, serif and sans serif, thin elements with thin
gain attention, create meaning, and facilitate retention.
elements, cool color and warm color
VISUAL DESIGN ELEMENTS
a. Line – describes a shape or outline. It can create shape. (Notice how similar Harmony is to Unity - some
texture and can be thick or thin. Lines may be actual, sources list both terms).
implied, vertical, horizontal, diagonal, or contour lines. e. Contrast – offers some change in value creating a
b. Shape – usually a geometric area that stands out visual discord in a composition. Contrast shows the
from the space next to or around it, or because of difference between shapes and can be used as a
differences in value, color, or texture. Shape may also background to bring objects out and forward in a
be organic. design. It can also be used to create an area of
c. Value – the degree of light and dark in a design. It is emphasis.
the contrast between black and white and all the tones f. Directional Movement – a visual flow through the
in between. Value can be used with color as well as composition. It can be the suggestion of motion in a
black and white. Contrast is the extreme changes design as you move from object to object by way of
between values. placement and position. Directional movement can be
d. Texture – the way a surface feels or is perceived to created with a value pattern. It is with the placement of
feel. Texture can be added to attract or repel interest to dark and light areas that you can move your attention
a visual element. Visual texture is the illusion of the through the format.
surfaces peaks and valleys, resulting in a feeling of g. Rhythm – a movement in which some elements recur
smoothness or roughness in objects. regularly. Like a dance, it will have a flow of objects that
e. Color – determined by its hue (name of color), intensity will seem to be like the beat of music. h. Perspective –
(purity of the hue), and value (lightness or darkness of created through the arrangement of objects in two
hue). Color and color combination can play a large role in dimensional space to look like they appear in real life.
the design. Color may be used for emphasis, or may elicit Perspective is a learned meaning of the relationship
emotions from viewers. Color maybe warm, cool, or between different objects seen in space.
neutral. It plays a major role in our visual perception, as it
influences our reactions about the world around us. It is
therefore important to create color palettes that evoke
the appropriate audience reactions. Color has three
properties.

f. Form – a figure having volume and thickness. An Audio Information and Media Third on our list how
illusion of a 3-dimensional object can be implied with people media maximizes technology resources is the audio
the use of light and shading. Form can be viewed from information and media. This refers to materials, programs,
many angles. applications and the like that teachers and students use to
VISUAL DESIGN PRINCIPLES formulate new information to aid learning through the
a. Consistency of margins, typeface, typestyle, and use, analysis, evaluation and production of sound (MIL
colors is necessary, especially in slide presentations or Curriculum Guide by DepEd). Media convergence is
evident when visual information and media is combined
documents that are more than one page.
now with audio information and media. Audio enhances
b. Center of interest – an area that first attracts
the mood and convey emotions that visuals can’t. Thus, it
attention in a composition. This area is more important
is vital to make certain that the key message and intention
when compared to the other objects or elements in a
are consistent in both different media.
composition. This can be by contrast of values, more
Types and Categories of Audio Information
colors, and placement in the format.
1. Radio broadcast - live or recorded audio sent through
c. Balance – a feeling of visual equality in shape, form,
radio waves to reach a wide audience.
value, color, etc. Balance can be symmetrical and evenly
2. Music - vocal and/or instrumental sounds combined
balanced, or asymmetrical and unevenly balanced.
in such a way as to produce beauty of form, harmony,
Objects, values, colors, textures, shapes, forms, etc. can
and expression of emotion. It is composed and
be used in creating balance in a composition.
performed for many purposes, ranging from aesthetic
d. Harmony – brings together a composition with
pleasure, religious or ceremonial purposes, or as an
similar units. If for example your composition was using
entertainment product.
wavy lines and organic shapes, you would stay with
3. Sound recording - recording of an interview, meeting,
those types of lines and not put in just one geometric
or any sound from the environment.
4. Sound clips/effects - any sound, other than music or
speech, artificially reproduced to create an effect in a
dramatic presentation, as the sound of a storm or a
creaking door.
5. Audio Podcast - a digital audio or video file or
recording, usually part of a themed series, that can be
downloaded from a website to a media player or
computer.
Different Ways of Storing Audio Media
1. Tape - magnetic tape on which sound can be
recorded.
2. CD - a plastic-fabricated, circular medium for
recording, storing, and playing back audio, video, and
computer data.
3. USB drive - an external flash drive, small enough to
carry on a key ring that can be used with any computer
that has a USB port.
4. Memory Card - (aka flash memory card or storage
card) is a small storage medium used to store data such
as text, pictures, audio, and video, for use on small,
portable, or remote computing devices.
5. Computer hard drive - secondary storage devices for
storing audio files.
6. Internet/Cloud - websites or file repositories for
retrieving audio files, and more precisely the files are
stored in some datacenter full of servers that is
connected to the Internet

You might also like