Professional Documents
Culture Documents
INFORMATION LITERACY
PRESENTED by:
Ms. Julienne L. Olaybar
Instructor
Table of Contents
01 02 03
INTRODUCTION to THE EVOLUTION OF INFORMATION
MIL TRADITIONAL TO LITERACY
NEW MEDIA
04 05 06 07
TYPES OF MEDIA MEDIA AND MEDIA AND LEGAL, ETHICAL AND
INFORMATION INFORMATION SOCIETAL ISUES IN
SOURCES LANGUAGES MEDIA
01
INTRODUCTION TO MIL
Media and information will enable us to access,
understand and create communications in a variety of
contexts in the form of accessing, understanding and
creating media and information.
9. Media messages can be decoded -By ‘’deconstructing’’ media, we can figure out who
created the message, and why
10. Media literate youth and adults are active consumers of media Many forms of media-like
television- seek to relate pass, impulse consumers.
QUESTION for CHAPTER 1
• WHAT IS INFORMATION LITERACY?
• WHAT IS TECHNOLOGY LITERACY?
02
THE EVOLUTION OF TRADITIONAL
TO NEW MEDIA
PRE-INDUSTRIAL AGE (BEFORE 1700’s)- People discovered fire,
developed paper from plants, and forged weapons and tools with stone,
bronze,
INDUSTRIAL AGE (1700-1930)
People used the power of steam, developed machine tools, established
iron production, and the manufacturing of various products (including
books through the printing press).
ELECTRONIC AGE (1930-1980’s)
The invention of the transistor ushered in the electronic age. People harnessed the power of
transistors that led to the transistor radio, electronic circuits, and the early computers. In this
age, long distance communication became more efficient.
INFORMATION AGE (1900’s- 2000’s) The internet paved the way for faster
communication and the creation of the social network.
CHAPTER 3:
INFORMATION
LITERACY
COPYRIGHT - Refers to the legal right of the owner of intellectual
property. In simpler terms, copyright is the right to copy.
INFORMATION LITERACY
an understanding and set of abilities enabling individuals to recognize when
information is needed and have the capacity to locate evaluate, and us effectively
the needed information. Forms the basis for lifelong learning.
ETHICAL USE OF INFORMATION
1. You need to show to the reader which part of the text is your own thinking
and when you are quoting or paraphrasing someone else’s idea.
4. Ask your thesis supervisor which style you should use in your thesis as there
are many different styles. (e.g. APA, Chicago, etc)
2. “The Photocopy”
➢ The writer copies significant portions of text straight from a single source, without alteration.
2. “The Misinformer”
➢ The writer provides inaccurate information regarding the sources, making it impossible to find them.
• CYBER-RELATIONSHIP ADDICTION
Addiction to social networking, chat rooms, texting and messaging to the point where a virtual, online
friends become more important that real- life relationships with family and friends.
• NET COMPULSIONS
Such as compulsive, online gaming, gambling, stock trading or compulsive use online auction sites as
eBay, often resulting in finance and job-related problems.
• COMPUTER ADDICTION
Obsessive playing of off-line computer games, such as solitaire, minesweeper, or obsessive computer
Programming.
• INFORMATION OVERLOAD
Compulsive web surfing or database searching, leading to lower work productivity and less social
interaction with the family and friends.
• CYBERBULLYING
Is the use of information technology to harm or harass other people in a deliberate, repeated
and hostile
manner.
• HACKING
Those individuals who engage in computer hacking activities are typically referred to as
‘’hackers’’.
• PHISHING
Is the attempt to obtain sensitive information such as usernames, passwords, and credit details
(and,
indirectly, money, often for malicious reasons, by disguising as a trustworthy entity in an
electronic
Communication.
• ILLEGAL DOWNLOADING
Refers to obtaining files that you do not have the right to use from the internet.
• DIGITAL PIRACY
The practice illegally copying and selling digital music, video computer software, etc.
• CYBER DEFAMATION
Is an unprivileged false statement of fact which tends to harm the reputation of a person
company
• Republic Act No. 10175
-Chapter 1, Sect.1, “Cybercrime Prevention Act of 2012”.
-Sect.2 state that "The State recognizes the vital role of
information and communications industries such as content
production, telecommunications, broadcasting electronic
commerce, and data processing, in the nation’s overall social
and economic development..."