You are on page 1of 9

PINES CITY COLLEGES

GENERAL EDUCATION DEPARTMENT


Second Semester, AY 2020-2021

I. Course Number: IT 101 LECTURE


II. Course Title: LIVING IN THE INFORMATION TECHNOLOGY ERA

Modular Learning Guide #8

Topic: MEDIA & INFORMATION LITERACY and ONLINE- SAFETY


Expected Time of Completion: 4 hours

A. LEARNING OUTCOMES
At the end of this module you can:
1. Define Media & Information Literacy
2. Enumerate the five laws of information literacy
3. Practice on-line safety

B. LEARNING CONTENT
From previous lessons, we have learned that our society is now being
reshaped by rapid advances in information technologies—computers,
telecommunications networks, and other digital system. These
technologies allow us to transmit information quickly and widely. The
rapid evolution of digital technologies is creating not only new
opportunities for our society but challenges to it as well. Entire industries
have been restructured to better align themselves with the realities of
the digital age. It is no great exaggeration to say that information
technology is fundamentally changing the relationship between
people and knowledge.
With the development of the internet, knowledge is created and
disseminated in all forms and formats. Media and information increase
every day and it becomes so abundant that it can be found anywhere,
anytime especially in the booming era of data and information
explosion. Becoming media and information literate individuals will test
Our patience on how we deal with information and misinformation. It
includes a certain level of respect towards those who need and request
it. Respect for information need means we allow each and every one to
express their ideas, opinions, and expressions fully without any judgment
or prejudice. Hence there is a need for us to be familiar with Media and
Information Literacy (MIL) as it teaches us to use information and media
Content in an ethical, efficient, and effective manner.

Let us start first by defining the following terms:


Information. A broad term that covers processed data, knowledge
derived from study, experience, instruction, signals or symbols.
Literacy. The ability to identify, understand, interpret, create,
communicate and compute, using printed and written materials
associated with varying contexts. Literacy involves a continuum of
learning, wherein individuals are able to achieve their goals, develop
their knowledge and potential, and participate fully in their community
and wider society.
Media. The physical objects used to communicate with, or the mass
communication through physical objects such as radio, television,
computers, film, etc. It also refers to any physical object used to
communicate messages.
Media Literacy. The ability to access, analyze, evaluate, and create
media in a variety forms. It aims to empower citizens by providing them
with the competencies (knowledge and skills), necessary to engage
with traditional media and new technologies. According to UNESCO
Media and Information Literacy Curriculum for Teachers, this involves
understanding and using mass media in either assertive or non-assertive
way, including and informed and critical understanding of media, what
techniques they employ and their affects. Another understanding of
the term is the ability to decode, analyze, evaluate, and produce
communication in a variety of forms.

Information literacy is the set of skills required to identify, retrieve,


organize, and analyze information. It is something all students must
learn to effectively complete research, and it's a prevalent aspect of
higher education. In the end, people with knowledge of information
literacy ore prepared to find the data they need for any decision or
task in life. In essence, they've teamed how to learn, which makes
them better equipped to do so in all situations.
Through information literacy, we recognize that not all information
is created equal. For instance, content on the Internet continually
grows, but it doesn't always come from credible sources. The problem
with the Internet is that anyone can publish content for others to
access. This means that there is a lot of bad information to sort through
when performing research. It is not always easy to determine which
credible, peer-reviewed sources, and which are not.
Students no longer go to encyclopedias and other books at the
library to look up information; they instinctively go to the Internet.
Information literacy helps students recognize misleading, out-of-date,
or false information. It also helps them sort through the data and
interpret it intelligently. Libraries full of books are still available and a
valuable resource for students, but information literacy includes the
Internet and beyond, Information literacy isn't something you can
learn by reading a book; it takes hands-on practice. Published books
are generally accepted as credible sources, but the Internet is one of
the best places to practice information literacy.
Here is the information literacy process:

Recognize problems and create questions

Make a plan for finding information and solutions

Formulate hypotheses and make predictions

Find information and data from books and the internet

Evaluate the credibility of the sources (i.e. is the material


peer-reviewed or held to an ethical standard?

Organize and syntesize all gathered information

Make conclusions and process and understanding

Technology Literacy. The ability of an individual, either working


independently or with other, to responsibly, appropriately, and
effectively use technological tools. Using these tools an individual can
access, manage, integrate, evaluate, create and communicate
information. It also refers to the ability to understand and use
information in multiple formats from a wide range of sources when it is
presented via computers and to a person’s ability to perform task
effectively in a digital environment.
Media and Information Literacy. The essential skills and
competencies that allow individuals to engage with media and other
information providers effectively, as well as develop critical thinking and
life-long learning skills to socialize and become citizens.

Media Modality refers to the nature of message, whether it is


relayed using text, audio, video, graphics, animation, or a combination
of any these things. The media format is the way the data is arranged.
The data or message may be transmitted through radio waves (for
audio) and light waves for other modalities. The mass media form refers
to the particular media technology to which the message is
transmitted.
It is also necessary to understand grapevine communication which
is really applicable in media, this is an unorganized and unofficial
channel of communication in an organization. This becomes possible
when formal channels fail or do not work properly and some members
of the organization spread rumors or false information.
Open the link and read more of the GRAPEVINE COMMUNICATION
http://articles-junction.blogspot.com/2013/08/define-grapevine-com
munication-and-types.html
Media and Information Technology
Media and Information Literacy (MIL) is a "combination of
knowledge, attitudes, skills, and practices required to access, analyze,
evaluate, use, produce, and communicate information and
knowledge in creative, legal and ethical ways that respect human
rights" (Moscow Declaration on Media and Information Literacy, 2012).
The United Nations Educational, Scientific, and Cultural Organization
(UNESCO) defines it as the "set of competencies to search, critically
evaluate, use and contribute information and media content wisely;
knowledge of one's rights online; understanding how to combat online
hate speech and cyberbullying; understanding of the ethical issues
surrounding the access and use of information; and engage with media
and ICTs to promote equality, free expression, intercultural/interreligious
dialogue, peace, etc." (UNESCO, 2016).

Five of MIL
Indian librarian, SR. Ranganathan is known for his five laws of library
science which is widely used everywhere. These laws were transformed
into the new five laws of media and information literacy which is
applicable in today's information society. These laws will guide each
one of us to be a certified media and information literate individuals.

RANGANATHAN’S MIL LAW


LAW
Books are for use Information, communication, libraries, media, technology,
the internet as well as the other forms of information providers
are for use in critical civic engagement and sustainable
development. They are equal in stature and none is more
relevant than the other or should ever treated as such.
Every reader his/her Every citizen is a creator of information/knowledge and has a
book message. They must be empowered to access new
information/knowledge and to express themselves. MIL is for
all—women and men equality-and a nexus of human rights.
Every book its reader Information, knowledge, and messages are not always value
neutral, or always independent of biases. Any
conceptualization, use and application of MIL should make
this truth transparent and understandable to all citizens.
Save the time of the Every citizen wants to know and understand new information,
reader knowledge and messages as well as to communicate, even if
he/she is not aware, admits or expresses that he/she does.
Her/his rights must however never be compromised.
Library is an evolving Media and information literacy is not acquired at once. It is a
organism lived and dynamic experience and process. It is complete
when it includes knowledge, skills and attitudes, when it
covers access, evaluation/assessment, use, production and
communication of information, media and technology
content.
On-line Safety and Security Tips
Massive data breaches, marketers tracking your every step online.
shady people exploring the photos you shared in social networks — the
list of digital annoyances goes on and on. However, it's not completely
hopeless: You do have control over your data. Here's how to improve
your privacy online.
1. Check social privacy settings
If you have social accounts, those networks have a lot of
information about you, and you might be surprised how much of
it is visible to anybody on the Internet by default. That's why we
strongly recommend you check your privacy settings: It's up to
you to decide what info you want to share with complete
strangers versus your friends — or even nobody but you.

2. Don't use public storages for private information


Oversharing is not limited to social networks. Don't use online
services that are meant for sharing information to store your
private data. For example, Google Docs isn't an ideal place to
store a list of passwords, and Dropbox is not the best venue for
your passport scans unless they are kept in an encrypted archive.
Don't use services meant for sharing to store your private data.

3. Stay private on Wi-Fi networks.


Get a VPN and Use It. Avoid using public Wi-Fi if possible. Public
Wi-Fi networks usually do not encrypt traffic, and that means
anyone on the same network can try to snoop on your traffic.
Avoid transmitting any sensitive data — logins, passwords, credit
card data, and so forth — over public Wi-Fi. Any time you
connect to the Internet using a Wi-Fi network that you don't
know; you should use a virtual private network (VPN). "VPNs
provide a secure connection over the Internet between a user
and the data or websites to which they connect, and encrypt
the data exchanged across that connection,"
Say you go to a coffee shop and connect to a free Wi-Fi
network. You don't know anything about the security of that
connection. It's possible that someone else on that network,
without you knowing, could start looking through or stealing the
files and data sent from your laptop or mobile device.

4. Keep your main e-mail address and phone number private


Your reward for sharing your e-mail address and phone number?
Tons of spam in Your e-mail inbox and hundreds of robocalls on
your phone. Even if you can't avoid sharing this info with Internet
services and online stores, don't share it with random People on
social networks. And consider creating a separate, disposable
e-mail address and, if possible, a separate phone number for
these cases. Create an additional e-mail account and purchase
an additional SIM card to use for online shopping and other
situations that require sharing your data with strangers.

5. Use messaging apps with end-to-end encryption


Most modern messaging apps use encryption, but in many
cases it's what they call encryption in transit messages are
decrypted on the provider's side and stored on its servers. What if
someone hacks those servers? Don't take that risk— chose end
to-end encryption — that way, even the messaging service
provider can't see your conversations.

6. Use secure passwords Using weak passwords to protect your


private information is as good as shouting that information to
passersby. Use long (12 characters and more) passwords
everywhere

7. Use Unique Passwords for Every Login

One of the easiest ways hackers steal information is by getting a


batch of username and password combinations from one source
and trying those same combinations elsewhere. For example,
let's say Store A has been hacked, and the hackers got your
username and password. The hackers might try to log into
banking sites or major email services using the same username
and password combination.

8. Review permissions for mobile apps and browser extensions


Mobile apps prompt you to give them permissions to access
contacts or files in device storage, and to use the camera,
microphone, geolocation, and so on. Some really cannot work
without these permissions, but some use this information to profile
you for marketing (and worse). Fortunately, it's relatively easy to
control which apps are given which permissions. The same stands
for browser extensions, which also have unfortunate spying
tendencies. Review the permissions you give to mobile apps. Do
not install browser extensions unless you really need them.
Carefully check the permissions you give them.

9. Secure your phone and computer with passwords or passcodes


Our computers and phones store a lot of data we'd rather keep
private, so Protect them with passwords. These passwords don't
have to be complicated and Unique, but they should keep
random people out. On mobile devices, do a bit better: six-digit
PINs or actual passwords rather than four digits and screen-lock
patterns. Use Passwords or biometric authentication to lock your
phones, tablets, and computers.
10. Disable lock screen notifications
Protect your phone with o long. secure password but leave
notifications on the screen? NOW any passerby can see your
business, to keep that information from appearing on the locked
screen, set up notifications correctly. Disable screen notifications
hide sensitive from the lock screen.

11. Clear Your Cache


Never underestimate how much your browser's cache knows
about you. Saved cookies, saved searches, and Web history
could point to home address. family information. and other
personal data.
To better protect that information that may be lurking in your
Web history, be sure to delete browser cookies and clear your
browser history on a regular basis. "l do it daily, but most people
would balk at that," Rashid said. Some tune-up-utilities have a
setting that automatically cleans out saved browser data
however often you like.

12. Off Save Password' Feature in Browsers


Speaking of what your browser may know about you. many
browsers offer some kind of password management solution.
Some browsers by default still prompt to save your web
passwords. Turn that off. You don’t need it.

13. Don't Fall Prey to Click Bait


Part of securing your online life is being smart about what you
click," Rubenking said. Click bait doesn't just refer to cat
compilation videos and catchy headlines. it can also comprise
links in email, messaging apps, and on Facebook. phishing links
can cause malware to automatically download and infect your
device. "Don't click links in emails or text messages unless they're
without a doubt from a source known to you," he added. The
same goes for links on social media sites. "lf the post seems at all
unlike the style of your social media buddy, it may be a hack."

14. Explore the Security Tools You Install


Many excellent apps and settings help protect your devices and
your identity, but they're only valuable if you know how to use
them properly. "A lot of people switch on Find My iPhone or install
security software and then never explore the settings, or even try
out the service to see how it works," security writer and PCMag
analyst Max Eddy mentioned. What good is Find My iPhone if you
haven't enabled it properly or don't know how to locate your
device if it's stolen? Actually understanding the tools that you
assume will protect you will go a long way toward them actually
protecting you," he said.

C. LEARNING ACTIVITY

Activity A (20 pts)


Weekly Interaction Log with Information and Information Providers
Media or Information Provider Number of Hours in a Week
YouTube
Facebook
Television
Books
Others (specify)
1. Which media provider did you spend the most time? Why? (5pts)
2. What role does media play in your life? (5 pts)
3. What could be the implication of your answers in the table above?
(10 pts)

Activity B
1. Self-evaluation question. (20 pts)
Answer each question briefly.
a. Why do you need information?
b. Where do you search information?
c. How do you acquire and store information?
d. How will you determine the quality and accuracy of
information that you have?
e. How do you use the information that you have?
f. How will you communicate the information that you
have?
2. Disaster Scenario (20 pts)
“According to the weather forecast, there is no typhoon.
However, your locality is experiencing rainfall, while some parts in
your province/region are already flooded. There are reported
incidents of landslide, evacuation, stranded vehicles and
drowning. As a student, what are you going to do?
Information needs
(What information do
you need?)
Sources of
information
(Where will you get
them?)
Access to the
information
(How will you access
them?)
Evaluate
information
(How will you check
the quality of
information?)
Organize
Information
(How will you
organize and store
them?)
Communicate
Information
(How will you create
and communicate
them?)

References:

https://www.kaspersky.com/blog/privacy-ten-tips-2018/23022
https://nu.kz.libguides.com/MIL/tips
http://articles-junction.blogspot.com/2013/08/define-grapevine-communicatio
n-and-types.html
http://www.unesco.org/new/fileadmin/MULTIMEDIA/HQ/CI/CI/pdf/In_Focus/Wi
lson.pdf
https://dpi.wi.gov/sites/default/files/imce/imt/pdf/itlstandardsfinaladopted.pdf
https://medialiteracynow.org/what-is-media-literacy/

Prepared By: Noted by:

Rowena T. Acacio Engr. Cecilia L. Cabanilla

Janice S. Patacsil

You might also like