You are on page 1of 6

MEDIA AND INFORMATION LITERACY REVIEWER QUARTER 1

MANDY U

To become information literate, we have to go through the


COMMUNICATION
Came from the Latin word "commūnicāre" meaning "to share" following stages:
or "to divide out". Identifying/recognizing information needs
is a process of sharing ideas among persons through various Determining sources of information
channels to gain a common understanding. Citing or searching for information
The process involving people using phones is also known as Analyzing and evaluating the quality of information
communication. Organizing, storing, or archiving information
Humans communicate through verbal and nonverbal Using information in an ethical, efficient, and effective way
communication Creating and communicating new knowledge

THE BASIC TYPES OF COMMUNICATION Technology Literacy


VERBAL COMMUNICATION happens vocally or through
The ability to use effective technology to interact and
written words. There are 2 types: Oral communication and
analyze information to improve learning and skills in the
Written communication
21st century.
ORAL COMMUNICATION uses words or talking to
The use of messages from media sources.
communicate.
WRITTEN COMMUNICATION is expressed through a written Computer-Mediated Communication
word used in any medium. Also know as CMC
NONVERBAL COMMUNICATION is without the use of voice Is a paraglider term referring to human communication
and written languages. through computers.
PARTS OF THE COMMUNICATION MODEL SYNCHRONOUS CMC, where contact takes place in real-
SOURCE or SENDER – one who sends the message and initiates time.
communication. ASYNCHRONOUS CMC, where participants are not actually
MESSAGE – the information or message simultaneously online.
MEDIUM or CHANNEL – media is the plural of “medium”, or
The Evolution of Media from Traditional to New Media.
ways to communicate info.
RECEIVER – The one who receives the message
Pre-historic Age (Before 1700)
EFFECT – Response of the receiver after getting the message. People discovered fire, developed paper from plants, and
FEEDBACK – An important product of the communication forged equipment or weapon through stone, bronze,
process. Tells how effective the message. copper, and iron.
NOISE or BARRIERS – These are the disruptions in the Example forms of media: Cave Painting (35,000BC), Clay
communication process. tablets in Mesopotamia (2400BC), Papyrus in Egypt (2,500BC)
Literacy Industrial Age (17005 - 19305)
A person's ability to define, recognize and construct variously People used the power of steam, developed machine tools,
printed and written media. established iron production, and manufactured various
The ability to read, write, speak and listen in a way that lets products.
us communicate effectively and make sense of the world. Example forms of media: Typewriter (1800), Telephone (1876)
Electronic Age (1930 - 1980)
media Literacy
Accessibility, review, and assessment of media People harnessed the power of electricity which led to
A method by which media content is dissected for critical electrical communication. In this age, long distance
analysis. communication became more efficient.
It is important to look at the underlying meanings of media Example forms of media: Mainframe Computer (1960),
content. Television (1941)
Able to analyze media messages as well as create. New (Digital) Age (1900s-2000s)
information Literacy The use of microelectronics in the development of personal
computers. In this era, the Internet paved the way for
A collection of skills requires individuals to identify when
quicker communication.
knowledge is needed.
Example forms of media: Portable Laptop (1980), Friendster
It aims at encouraging individuals to efficiently search,
analyze and use information.
(2002), Internet Explorer, Skype (2003), Google 1997, Smart
INFORMATION is data that has been collected, processed, Phones, Digital Technologies.
and interpreted in order to be presented in a usable form.
MEDIA AND INFORMATION LITERACY REVIEWER QUARTER 1
MANDY U

FUNCTIONS OF COMMUNICATION AND MEDIA media convergence


A theory in communications where every mass medium
Inform Citizens of what is happening
eventually merges into one medium due to the new
Any of these have fundamentally changed how mainstream communication technologies.
media options such as newspapers and television stations The co-existence of traditional and new media
distribute news stories to us. The co-existence of print, broadcast, and online media
Educate the audience The ability to transform different media into digital code
Media offer awareness and information.
THE INFORMATION NEEDS
Media can become an instrument for the dissemination of refers to what an individual recognizes the information needs
false and inflammatory messages. We need it because it allows us to focus on our needs in
Negative messages can divide communities and can help searching for reliable sources of such information.
perpetuate the stereotypes that nurture violence. Different sources of information including media, the internet,
Provide a platform for public discourse libraries, archives, museums, and our own experiences.
Mass media and other forms of information have a huge Authenticity
impact on influencing public sentiments and underlying Refers to the information’s originality or legitimacy
feelings. Validity
“Watchdog” role of journalism May include accuracy and precision of information presented
The watchdog is designed to prevent the government from such that it is more factual, less biased and error free
taking too much control from the people and violating their Reliability
limits. may also include validity but it may also refer to information’s
Channel for advocacy for political viewpoints relevance, whether it is up-to-date and reliable.
Media inform and alert people with news and information to Libraries
help them form their opinions about political issues and A source place containing collections of books, periodicals,
candidates. and, for people to read, borrow, or refer to is called a library
Types OF MEDIA Repository of information and collection of written
Print Media knowledge.
This is the printed version of the news The main role of libraries is to organize and provide you with
Examples: newspapers, newsletters, magazines, banners, access to information.
books, billboards, and brochures. INDIGENOUS KNOWLEDGE AND INDIGENOUS MEDIA
Broadcast Media Indigenous Knowledge
It is the most convenient means to transmit information to Local knowledge – knowledge that is unique to a given
the audience. culture or society.
Examples: Radio, film/movie, Television Owned, controlled, and managed by indigenous peoples
Utilizing indigenous materials and resources, reflecting
New (Online) Media
community needs and interests, visions and aspirations, and
These are forms of electronic communication made
being independent of vested interest groups.
through the Internet.
Indigenous media
Example: Website and blogs, streaming, email and social
is any type of media that is produced and operated by the
media
government and the community and is separate from public
Nature of news broadcasting media.
Print news / traditional print Characteristic of Indigenous Media
Considered tangible information structured to be reread. The oral tradition of communication
It provides depth, context and information that television Store information in memories
and radio cannot supply. Information exchange is face-to-face
Broadcast news Information is contained within the border of the community
Brief or short SKILLS IN DETERMINING ACCURATE INFORMATION
They boil issues down to their basics and write them as Look for facts.
concisely as possible. Cross-reference with other sources to check for consistency.
The news in New (Online) Media Determine the reason for writing and publishing the
More flexible than in print and broadcast media information.
Through the Internet, news media its easier to rely on Check for advertising.
online sources of news instead of traditional print and
broadcast media.
MEDIA AND INFORMATION LITERACY REVIEWER QUARTER 1
MANDY U

THE MEDIA AND INFORMATION LANGUAGES Clickbait


Language a form of false advertisement that uses hyperlink that is
designed to attract attention and entice users to follow.
Pertains to the technical and symbols, or codes and
conventions that media and information. Propaganda
Media Languages Stories that are created to deliberately mislead audiences,
Refer to codes, conventions, formats, symbols, and narrative tories that are created to deliberately mislead audiences.
structures that indicate the meaning of media messages to Satire/parody
an audience. a type of parody presented in a format typical of journalism, it
THE MEDIA AND INFORMATION LANGUAGES is called satire when it is content uses humor to criticize
codes people
Known as a system or collection of signs that when put
Sloppy journalism
together creates a meaning. The publishing of stories with unreliable information or
without checking all of the facts can mislead audiences.
genre
The word ‘genre’ comes from the French word meaning 'type',
Misleading headings
'class’, or ‘kind.’ Stories that are not completely false can be distorted using
Genre is an important component for understanding misleading headlines
literature, film, television, and other forms of art media. Biased or slanted news
Media bias is what journalists and news producers do within
Conventions
the mass media in which selection of many events are covered
To be generally accepted ways of doing something.
It refers to a standard or norm that acts as a rule governing How is Fake News Spread
behavior. Bots
Other stakeholders include libraries, archives, museums, the They reside on social media platforms, created by someone
Internet and other relevant information providers. with computer programming skills
CODES IN MEDIA MESSAGES Trolls
MESSAGES - the information sent from a source to a receiver. When a post is accompanied by many likes, shares, or
AUDIENCE - the group of consumers for whom a media comments, it is more likely to receive attention by others
message is constructed as well as anyone else who is exposed Microtargeting
to the message. One way is to use social media analytics.
PRODUCERS - People engaged in the process of creating and The data from people's digital footprints is analyzed to create
putting together media content to make a finished media and convey messages that reflect an individual's preferences
product. and personality.
Technical Circular reporting / false confirmation
ways in which equipment is used to tell the story This is a situation in source criticism where a piece of
Examples: camera techniques, framing, depth of fields, information appears to come from multiple independent
lighting, exposure, etc. sources, but in reality, comes from only one source.
symbolic piracy
codes that are embedded in the technical codes It is the unauthorized reproduction or use of a copyrighted
Examples: objects, settings, body language, clothing, and color. book, recording, television program, patented invention,
written trademarked product, etc.
The use of language style and textual layout also expresses digital piracy
meaning. Refers to the illegal act of copying or sharing a digital work
without the permission of the copyright holder.
FAKE NEWS
Digital piracy grew out of computer hacking.
It is a form of news consisting of disinformation or hoaxes
Started in the mid-1970s, computer hobbyists began copying
spread via traditional news media (print and broadcast) or and distributing hard copies of computer software and games.
social media. Digital piracy pertains to any type of digital medium
Fake news is a neologism often used to refer to fabricated There 3 types: music piracy, video piracy, and software piracy
news.
is also known as junk news, pseudo-news, or hoax news.
MEDIA AND INFORMATION LITERACY REVIEWER QUARTER 1
MANDY U

Intellectual Property invention


IP is the creation of the minds Is something that has never been made before, or the process
WIPO (World Intellectual Property Organization) is the global of creating something that has never been made before
forum for intellectual property services, policy, information, It could be a new device, method, or process developed from
and cooperation. study and experimentation
IP is protected by patents, copyrights, and trademarks, which PATENT
enable people to gain recognition or financial benefits from Inventions are “Patents.”
what they create. This is an exclusive right granted for an invention.
IP System aims to foster an environment in which creativity provides the patent owner with the right to decide whether it
and innovation can grow to the right balance interests of the can be used by others.
public. Requirements for Patentability:
NOVELTY – Is it similar to another invention?
INTELLECTUAL PROPERTY IN THE PHILIPPINES SOLUTION TO A PROBLEM – What problem does it solve?
Article XIV (14), Section 13 of the 1987 Constitution INDUSTRIALLY APPLICABLE – Can it be used by the industry?
“The state shall protect and secure the exclusive rights of scientists, INVENTIVE STEP – Is the said solution obvious to an expert in the
artists, and other gifted citizens to their intellectual property and field?
creations, particularly when beneficial to the people, for such period TRADEMARK
as may be provided by law.” A visible sign is used to distinguish the goods or services of an
individual or enterprise.
Philippines Republic Act 8293
Trademarks date back to ancient times when craftsmen used
known as the “Intellectual Property Code of the Philippines”
to put their signature or "mark" on their products.
The Intellectual Property Office of the Philippines (IPOPHL) The protection of Trademarks is valid for 10 years and
The leads agency of the government that is in charge of the renewable every 10 years.
implementation of the Intellectual Property Code and Logos are designs used by an organization in its advertising,
handling the registration and conflict resolution of the right which the organization can easily be recognized.
The Intellectual Property Owners have the right to exclude or INDUSTRIAL DESIGN
include others in the Philippines. Constitutes the ornamental or aesthetic aspect of an article.
Intellectual Property as an asset is used for commercializing, Three-dimensional - the shape or surface of an article
licensing, franchising, and enhancing the market value of a Two-dimensional - patterns, lines, or colors.
business. protects only the appearance or aesthetic feature of a product.
WHY DO WE NEED TO PROTECT INTELLECTUAL PROPERTY? GEOGRAPHICAL INDICATION AND APPELLATION OF ORIGIN
Protection of IP rights is an incentive for human creativity. signs used on goods that have a specific geographical origin
Promotes respect for individual artists, and enables them to and possess qualities, a reputation, or characteristics that are
earn livelihoods. essentially attributable to that place of origin.
Prevents infringement and “free riding”. a geographical indication includes the name of the place of
IP serves as an instrument for economic development. origin of the goods.
New creativity helps create sustainable and competitive Examples: Baguio’s Best Strawberry Jam, Nueva Ecija’s Rice
businesses locally and internationally.
TRADE SECRET
TYPES OF INTELLECTUAL PROPERTY proprietary procedures, systems, devices, formulas,
COPYRIGHT strategies, or other information that is confidential and
simply taken from the words, “copy” with “right”. exclusive to the company using them.
A legal term used to describe the rights that creators have Is an intellectual property right on confidential information
over their literary and artistic works. which may be sold or licensed.
The validity period of Copyrighted works is the Lifetime of the FAIR USE
author + 50 years after death. means you can use copyrighted material without a license
only for certain purposes.
A majority of the content you create must be your own.
Give credit to the copyright holder.
Don't make money off of the copyrighted work.
These include:
Commentary Research
Criticism Teaching
Reporting
MEDIA AND INFORMATION LITERACY REVIEWER QUARTER 1
MANDY U

LEGAL SHARING USING THE CREATIVE COMMONS SOURCES CITED


Creative Commons is an American non-profit organization The Forgotten Footnote
devoted to expanding the range of creative works available The writer mentions an author’s name for a source, but
for others to build upon legally and to share. neglects to include specific information on the location of the
DIFFERENT CREATIVE COMMONS LICENSES material referenced.
ATTRIBUTION: You must credit the creator in order to use, The Misinformer
copy, or share the content. The writer provides inaccurate information regarding the
NON-COMMERCIAL: You can't make a profit from the sources, making it impossible to find them.
content. The Too-Perfect Paraphrase
NO DERIVATIVE WORKS: You can't change the content. The writer properly cites a source but neglects to put in
SHARE ALIKE: You can change the content, but you have to quotation marks text that has been copied word-for-word, or
let other people use your new work with the same license as close to it.
the original. The Too-Perfect Paraphrase
Public Domain The writer properly cites a source but neglects to put in
No individual owns these works; rather, they are owned by quotation marks text that has been copied word-for-word, or
the public. close to it.
Enable authors and copyright owners who want to dedicate The Resourceful Citer
their works to the worldwide public domain The writer properly cites all sources, paraphrasing and using
PLAGIARISM quotations appropriately but the paper contains almost no
a piece of writing that has been copied from someone else and original work
is presented as being your own work. The Perfect Crime
Any written work, published or unpublished, can be The writer properly quotes and cites sources in some places,
plagiarized. but goes on to paraphrase other arguments from those
The act can be intentional or unintentional sources without citation.
Plagiarism does not solely apply to written work.
MUSIC, VIDEOS AND MUSIC THAT COUNT FOR PLAGIARISM:
HOW TO AVOID COMMITING PLAGIARISM
Copying media from other websites to paste them into your Paraphrase
own papers or websites. find information that fits your written work, read it carefully
Making a video using footage from others’ videos or using then rewrite it using your own words.
copyrighted music as part of the soundtrack. CITE
Performing another person’s copyrighted music A source citation usually includes the author’s name and
Composing a piece of music that borrows heavily fro another publication date.
composition. Quote
SOURCES NOT CITED When quoting directly, copy the exact word, phrase,
The Ghost Writer sentence, or paragraph the author wrote, then enclose it in
quotation marks.
The writer turns in another’s work, word-for-word, as his or
her own.
Cite quotes
The Photocopy When citing a quote’s source, include the page (for a book) or
paragraph (for web content) number.
The writer copies significant portions of text straight from
asingle source, without alteration.
Cite your own work
The Potluck Paper If you used information from previous personal work, cite it.
The writer copies several different sources and fits them all
Reference
together Cite all of your references. This is a way to acknowledge the
The Poor Disguise hard work of the people whose work helped you complete
yours.
They altered the paper's design by slightly changing key
word and phrases
The Labor of Laziness
The writer takes the time to paraphrase most of the paper
from other sources and make it all fit together.
The Self-Stealer
The writer “borrows” generously from someone's previous
work, violating policies and the expectation of originality.
MEDIA AND INFORMATION LITERACY REVIEWER QUARTER 1
MANDY U

DIGITAL CITIZENSHIP NETIQUETTE


Is our appropriate, responsible technology use. the forms required by good breeding or prescribed by
nine elements of digital citizenship authority to be required in social or official life.
Netiquette is a set of rules for behaving properly online.
Respect Yourself / Respect Others
DIGITAL ETIQUETTE CORE RULES OF NETIQUETTE:
Rule 1: Remember the Human
DIGITAL ACCESS
Rule 2: Adhere to the same standards of behavior online that you
DIGITAL LAW
Educate Yourself / Connect with Others follow in real life
Rule 3: Know where you are in cyberspace
DIGITAL LITERACY
Rule 4: Respect other people's time and bandwidth
DIGITAL COMMUNICATION
Rule 5: Make yourself look good online
DIGITAL COMMERCE
Protect Yourself / Protect Others Rule 6: Share expert knowledge
DIGITAL RIGHTS AND RESPONSIBILITY Rule 7: Help keep flame wars under control
DIGITAL SAFETY (SECURTIY) Rule 8: Respect other people's privacy
DIGITAL HEALTH AND WELFARE Rule 9: Don't abuse your power
DIGITAL DIVIDE Rule 10: Be forgiving of other people's mistakes
about a gap between demographics and regions that have
access to modern information and communication
BULLYING AND CYBER BULLYING
Bullying that takes place online, or using electronic
technology technology such as cell phones, computers, and tablets over
Lack for everyone to receive technology and internet access communication tools including social media sites, text
The Global digital divide designates countries as the units of messages, chat, and websites.
analysis and examines the divide between developing and Cyber Bullying is posting, sending, or even forwarding
developed countries on an international scale. unkind, harmful, negative, or embarrassing images or texts
6 FACTORS THAT CONTRIBUTES TO DIGITAL DIVIDE:
on the internet, social networks, or on cell phones.
Economic
Social The Anti-Bullying Act of 2013 (RA 10627)
Geographical Republic Act No. 10627 is an act that requires All Elementary
Fear of Technology and Secondary Schools to Adopt Policies to Prevent and
Lack of Motivation Address the Acts of Bullying in their Institutions.
Cultural. Cyber-bullying or any bullying done through the use of
technology or any electronic means is also bullying
THE DIGITAL FOOTPRINT
It is a trail of data you create while using the Internet. In punishable under the law.
includes the websites you visit, emails you send, and 5 BASIC FORMS OF BULLYING (According to Aquino's Law):
information you submit to online services. Physical Bullying
this trail can be big or small, and harmful or helpful. Leaving Verbal Bullying
an online record is nearly impossible to avoid; having that Relational Aggressions
record be a positive one is entirely possible. Cyberbullying
Sexual Bullying
Flaming / Flame Wars The Republic Act 10175: Cybercrime Prevention Act of 2012
The act of posting or sending offensive messages over the
internet. It is also the act of posting or sending offensive providing for the prevention, investigation, suppression, and
messages over the Internet is flaming imposition of penalties therefore, and for other purposes.
These messages can be posted in an online discussion, forums, punishes content-related offenses such as cybersex, child
or newsgroup or sent via email or instant messaging pornography, and libel which may be committed through a
applications. computer system.

INTERNET ADDICTION
a growing epidemic characterized by a compulsive desire to
interact online through internet gaming, gambling, cyber
activities, social networking or compulsive surfing of the web.

You might also like