You are on page 1of 25

Media & Information Literacy

Quarter 1 – Module 3
Responsible Use of Media and Information
Grade 12 – Media and Information Literacy
Quarter 1 – Module 3: Responsible Use of Media and Information
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from
their respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.

Published by the Department of Education, Schools Division of Antique

Development Team of the Module


Writer: Romeo Magluyan Valdez
Content and Language Editors: Sarah Michelle C. Nietes, Francisco E. Misajon Jr.
Illustrator: Conrad Ladislee B. Tua III
Layout Artist: Phoenix Allanah Zandria Q. Salcedo-Tordesillas
Management Team: Felisa B. Beriong CESO VI
Corazon C. Tingson
Gaudencio C. Riego PhD
Francisco E. Misajon Jr.
Schubert Anthony C. Sialongo
Phoenix Alianah Zandria Q. Salcedo-Tordesillas
Marian Rose B. Sarmiento

Printed in the Philippines by ________________________

Department of Education – Region VI – Schools Division of Antique

Office Address: Binirayan, San Jose de Buenavista, Antique


Telefax: (036) 540-9837
E-mail Address: antique@deped.gov.ph
Aiming at the Target
In this module, you will learn to discuss responsible use of media and
information.

Trying the Challenge


Identify the type of media being described in the following statements or
scenarios. Write the letter of your choice on your answer sheet.
1. This refers to the freedom of unauthorized intrusion.
a. Antitrespassing Law c. Solitary
b. Privacy d. None of the above
2. It is a statement that injures a third party‟s reputation.
a. Harassment c. Defamation
b. Editorialism d. Plagiarism
3. It is a form of protection provided for original works of authorship.
a. Copyright c. Royalty
b. Patent d. Legacy
4. It is a set of rules for proper online behavior.
a. Ethics c. Moral
b. E-behavior d. Conduct
5. It pertains to a damaging overdependence on something.
a. Abuse c. Addiction
b. Compulsion d. Depression
6. It is a legal term that applies to anything that is offensive to morals.
a. Obscenity c. Pornography
b. Disrespect d. Vandalism
7. This refers to the disparities in access to telephone, personal computers, and in
internet across certain demographic groups.
a. Media differences c. Digital Divide
b. Electronic discord d. Hacking
8. It refers to the aggressive behavior among school aged children that involve a
real or perceived power imbalance.
a. Bullying c. Derision
b. Misdemeanor d. None of the above
9. It refers to a civil wrong of defamation involving written statements,
a. Libel c. Slander
b. Infringement d. Hacking
10. It refers to a civil wrong of defamation involving spoken statements.
a. Libel c. Slander
b. Infringement d. Hacking

3
Lesson Responsible Use of media and
1 information

Technology is very significant in our life specially in using the internet.


It makes our works in schools, offices and at home easier and faster in
communication, researches, doing business and other online transactions. It
greatly helps continue education despite the pandemic. The world in the
internet is not a hundred percent safe for us users. We should bear in mind
to follow laws and rules in order to be protected from any cybercrime. This
issue shall be discussed in detail in the succeeding activities of this module
and how to conquer these problems.

Connecting to the Past

Image Source: https://www.cyberpatrol.com/assets/cyberpatrol/cybersharks_map.jpg

Answer the following questions based on your personal point of view.


Write your answers on your answer sheet.

1. What issues do you see in the poster?


2. Which one do you understand? Which one do you not know?
3. What possible dangers and issues of unguarded use of the internet are
depicted in the picture?
4. Which of these issues have happened to you or to your friends? Why
did they happen?

4
Gearing Up to Start
Before we proceed further, it is necessary to remember the concepts
and ideas in on your past lessons that are important in your current topic
on digital divide, addiction and bullying. These lessons could be taken from
the previous chapter of the subject in Media and Information Technology.
Are you ready! It‟s a fun learning experience! Let‟s begin!

Using the Anticipation guide, under the “Before Reading” boxes, write
YES on the blank if you agree and NO if you disagree the statement. Read
the statement carefully. Do this activity using your answer sheet.
ANTICIPATION GUIDE

Before Reading After Reading

Agree Disagree Statement Agree Disagree


1. The only barrier to overcome digital
divide is to have higher income.
2. Digital divide happens only in poor
countries.
3. Technology has advantage and
disadvantage to man‟s life.
4. Eating and sleeping late due to
playing online games has no adverse
effect to one‟s health.
5. Computer addiction can change the
behaviour of a person.
6. The most vulnerable in computer
exposure are the young individuals.
7. It is right to express our emotions in
social media,
8. Mostly young people are victims of
cyberbullying.
9. The anti-bullying Act protects the
bully.
10. Cyberbullying can be avoided.
11. Saying false statement to someone
can lead to legal issue.
12. Internet exposure may lead to
obscene features in the internet.
13. Parents have a major role in guiding
the children about online activities.
14. In social media, there is no „privacy‟.
15. One must grab information online
even without citing the source.

5
16. There should be time limit in using
online activities.
17. Only those living in the far-flung
places can experience digital divide.
18. Being a computer addict can affect
someone‟s health condition.
19. Nowadays, online activities make
the relationship of the family
members stronger.
20. Always think before we post
anything on social media.

The statements in the Anticipation Guide Sheet somehow activated


your learning about the issues in accessing the information and
communication technology via internet and its underlying ideas. You will
find out later on that these ideas are somehow connected to our current
topic to be discussed.

Hitting the Target

Digital Divide (DD)


Are all members in the family having skills in digital manipulation?
How did your parent enroll you in school this year? In what way do you
communicate with your family and friends far from you?

Some of you may answer differently like not all members have the
ability to use technology while other family members can. Some experienced
enrolling via online while others went to their respective barangay to get the
enrolment forms and lastly, others may have enrolled through letters or
basic phone call while others have used video call as a form of
communication. These are simple scenarios that we experience with what we
call digital divide.

Digital divide pertains to the social and economic imbalance of the


opportunities to access to, use of or knowledge of information and
communication technology (ICTs). It refers to a gap between sector in the
community who can access, has the skills and has desire to use the internet
and those who cannot. The unequal opportunity of the internet acquisition
is caused by the differences of skills, motivations and preferences of use
based on category such as personal category (gender, age, race/ethnicity,
personality, intelligence and Health), positional category (education,
occupation, household and nation) and the resources category (economic,
social and cultural capital) status of a person. The divides arise due to lack

6
of knowledge on how to manipulate the technology and understanding of its
benefits as well and some cannot afford to access because the income is low.

Benjamin Company defines „digital divide‟ as the disparities in access


to telephones, personal computers, and the internet across certain
demographic groups. Different segments have varying levels of access to
digital developments due to a number of factors. This can include but are
not limited to race, gender, age, employment, income, location, and religion.
For example, a 20-year-old millennial may be more active online, than a 70-
year-old war veteran. This is because the former grew with the internet
developments while the latter has been introduced to the World Wide Web
era way after their formative years.

However, this doesn‟t mean that the elderly do not have „access‟ or
they are simply not as comfortable with the internet as their younger
counterparts resulting to their limited presence online. Another example
would be between rural and urban settlers. Due to their distance from major
cities, their relatively small population size, and their low-income private
digital service providers do not often invest in far-flung provinces.

We will be able to overcome this phenomenon by:

1. lowering the cost of internet connection in the house


2. a law should be created to make all public places to have free internet
access set by the government
3. the different LGUs and NGOs should conduct a forum about the
advantage of technology and how to use the advance technology in rural
areas.
4. the parents should be given trainings related to technology by the schools
and libraries.
Computer Addiction

Addiction is defined as an overdependence on something or a


damaging need to do something. While it is commonly associated with
substances like recreational drugs, the digital age has now ushered an
addiction that is gradually raising concerns in industries and society as a
whole.

Thanks to smartphones and mobile internet data services, media


information is now widely available and constantly present in people‟s lives.
More and more individuals are now developing a heightened dependency
with media and information. Nowadays, smartphones have become a
necessity, something any average person couldn‟t live without. In fact,
whenever one goes, be it at a restaurant with friends or within the confines
of one‟s own bedroom, everyone feels the need to connect online. This

7
addiction according to the Huffington Post has been linked to poor quality,
anxiety, and even depression.

Internet is significant to man‟s life. It widens the spectrum of


communication and accessing information. It‟s easy to connect to the people
far from us.

Let me ask you these following questions.

1. Are you absentminded because you are thinking of an online activity?


2. Do you spend more time in the internet before you are satisfied?
3. Have you tried to stop using the internet (like playing online games)
chatting but fail to do it?
4. Is your education, relationship of the family and friends or work affected
by using the internet?
5. Is your behavior becoming moody, irritable or depressed if you cannot
use the internet?
6. Do you skip meals or sleep late because of excessive internet use?
7. Does internet give you comfort when you have a problem or when you are
in a bad mood?

If you have more YES answers than NO, then it‟s a sign that you are
experiencing Internet Addiction Disorder (IAD) or known as Computer
Addiction.

What is Computer Addiction?

Computer Addiction means the inability to control the desire of using


the technology (like computers, smartphones and internet) or an extreme
use of the computer which makes the person uneasy or feel anxiety in the
absence of the gadgets. It affects the daily routine in life like work, eating or
sleep is affected that could lead to social problem, change in behavior,
relationships and thought process. The three reasons why computer
addiction exists are depression, loneliness and social acceptance that young
people commonly experience.

Types of Computer Addiction

1. Information Overload is an excessive online surfing which results to


inefficiency at work and less family interconnection.
2. Compulsion is more time spent in online activities like gaming, bartering
of stocks and gambling which cause problems at work.
3. Cybersex addiction is excessive time spent in surfing porn sites that
could interfere with one‟s relationship.

8
4. Cyber relationship is excessive time spent in social networking sites to
make relationship online than spending time with real persons like family
and friends.

Different Symptoms of a computer addict person

1. Emotional Symptoms. These are feelings of guilt, anxiety, depression,


dishonesty, feeling of great happiness or excitement (euphoric) in front of
the computer, defensive, distress, escaping of work, isolation and cannot
follow schedule
2. Physical Symptoms. These include back pain, headache, increase or
decrease of weight, sleep disorder, carpal tunnel syndrome, blurred or
strained vision.
Computer Addiction can be prevented if you:

3. set limit in using computers and doing online activities;


4. talk to your family and friends and mingle with them most of the time;
5. organize a non-computer related activity like sports;
6. place your gadgets away from you when they are not needed.

Cyber Bullying

Social media is a significant tool in communication, and updating


information.

As the result from the survey of Stairway foundation reported in a news that
80% of young people ages 7 to 16 are victims of cyber bullying through
social media. The term bullying “refers to any severe, or repeated use by one
or more students of a written, verbal or electronic expression, or a physical
act or gesture, or any combination thereof, directed at another student that
has the effect of actually causing or placing the latter in reasonable fear of
physical or emotional harm or damage to his property; creating a hostile
environment at school for the other students; infringing on the rights of
other students at school; such as, but not limited to the following:

1. Any unwanted physical contact between the bully and the victim like
punching, pushing, shoving, kicking, slapping, tickling, headlocks,
inflicting school pranks, teasing, fighting and the use of available objects
as weapons;
2. Any Act that causes damage to a victim‟s psyche and /or emotional well-
being;
3. Any slanderous statement or accusation that causes the victim undue
emotional distress like directing foul language or profanity at the target,
name calling, tormenting and commenting negatively on victim‟s looks,
clothes and body.” (Republic Act No. 10627-Anti-Bullying Act)

9
a. Bullying happens in face to face (like in school) while cyber-bullying
happens in a cyberspace (means in interconnected digital technology).

What is cyber bullying?

Cyber bullying is a type bullying done online with the use of


technology like computers, laptops, and cellphone that can destroy the
physical and emotional aspect of the victim (called as bullied) by the one
who does the act (referred as bully). This problem is associated with the use
of internet and different platforms like text messaging, chatting, emails,
websites and social networking sites. The different forms of cyberbullying are
posting shameful pictures or videos in social media, sending threatening or
hurtful messages through chatting or text messages.

Bullying has always been a serious issue, particularly among the


youth. The U.S. Department of Health and Human Services defines it as an
unwanted, aggressive behavior among school-age children that involve a real
or perceived power imbalance. Simply put, kids who see themselves superior
to others display their misplaced power by causing physical, emotional, or
social harm to those they perceive to be weak.

Cyberbullying or bullying through electronic means, is one of the


many problems brought about by advancement in technology. With the
existence of smartphones, tablets, laptops, and 24/7 internet access,
cyberbullying, can happen to anyone, anywhere, and anytime. This may
involve exposing embarrassing content about someone or sending messages
with the intention of hurting the receiver emotionally or mentally.

Cyberbullying can be prevented by doing the following:


1. Be optimistic.
2. Share the problem with the person whom you can trust.
3. Keep your password to yourself. Don‟t share it.
4. Always check the content before posting or sharing it.
5. Always log out your account after using.
6. Respect and love other people and yourself.
Defamation:

The Cornell University Law School defines defamation as a statement


that injures a third party‟s reputation. The civil wrong of defamation
includes both libel (written statements) and slander (spoken statements).
To win a defamation case, a plaintiff must show four things:
a. A declaration that a false testimony is a fact;
b. Publication or communication of that statement to a third person;
c. Fault;
d. Damages to the subject (person, institution, etc.) of the statement.

10
With the existence of the new media, everyone is at liberty to
contribute and post information online. The problem with this evolutionary
form of media is the lack of check and balance that traditional media
requires. Often, those who post their opinions are taken as facts that may
result to defamation.

Privacy

Privacy in this context is defined as the freedom from unauthorized


intrusion. Also called as one‟s right to privacy, it refers to the concept that
one‟s personal information is protected from public scrutiny. This age of
information has made it difficult for this right to be asserted. Social media
has become the spotlight the world uses to take a peak into everyone„s
private lives. Even more concerning is the fact that we ourselves beam it on
our own personal lives. Our penchant for oversharing details of our lives
online poses serious security concerns. In fact, social media has been linked
to various stalking cases all over the world. Such a problem reiterates the
need for the responsible consumption of social media information.

Various social media platforms have incorporated privacy function on


their websites. This allows their users to choose which information they
want to share and to whom they want share it with. Blocking and reporting
abusive users have also been made available as an added security feature.
These efforts, along with current provisions in the law help in ensuring
everyone‟s right to privacy. However, it is important to note that self-
discretion goes along the way in protecting one‟s privacy.

Obscenity and Pornography

Obscenity and Pornography although related, are not the same.


Pornography is the term used to refer to any material that uses the elements
of nudity to cause sexual arousal among the audience. A pornographic
material is considered obscene when it crosses the line to a point that may
be offensive. The concept of what‟s obscene and what‟s not in pornographic
content may be vague or subjective. This is because what might be obscene
in one sector of society can be totally acceptable in another.

Copyright

Copyright is its literal sense means right to copy. The owner of a


copyright has the exclusive right to reproduce, distribute, perform, display‟
license, and to prepare derivative works based on the copyrighted works.
This protection is for “original works of authorship”. It applies to intellectual
properties like images (graphic designs, photos, drawings etc.), written books
(books, manuscripts, publications etc.), audio content (music and any other
sound recordings), and performance arts (play, movies, shows, and etc.)

11
A person or entities violating copyright commits plagiarism. Plagiarism
takes place when someone else‟s work is used by a different person and
claimed as his or her own. This act of stealing can be avoided by
acknowledging the source or the original creator through citations. The
exclusive rights of the copyright owner are subject to limitation by the
doctrine of “fair use”. Fair use of a copyrighted work for purposes such as
criticism, comment, news reporting, teaching, scholarship, or research is not
copy infringement.

Basic Ethical Orientation

Basic Ethical Orientation refers to the ethical perception of an


individual. It is the reasoning behind his or her moral judgments and ethical
practices. The following are types of basic ethical orientation.

 Divine Command Theories


 Being good is equivalent to doing whatever the Bible—or the
Qur‟an or some other sacred text or source of revelation—tells
one to do.
 “What is right” equals “What God tells me to do”.
 The Ethics of Conscience
 Conscience dictates what is wrong and right.
 It often has a religious source.
 It may be founded on a notion of human nature.
 It is often negative in character, telling people what is not right.

 Ethical Egoism
 It says the only person to look out for is oneself.
 The Ethics of Duty
 It begins with the conviction that ethics is about doing what is
right, about doing one‟s duty.
 Duty may be determined by reason, professional role, and
social role.
 The Ethics of Respect
 Human interactions should be governed by rules of respect.
 What counts as respect can vary from one culture to another.
 Utilitarianism
 It seeks to reduce suffering and increases pleasure or
happiness.
 Demands a high degree of self-sacrifice- considers the
consequences for everyone.
 Utilitarianism claim the purpose of morality is to make the
world a better place.
 The Ethics of Justice

12
 What is fair for one should be fair at all.
 Treating people equally may not mean treating them the same.
 Virtue Ethics
 It seeks to develop individual character.
 It assumes good persons will make good decisions.
 It was developed by Plato and Aristotle.
 It is the spiritual exercise.
 It provides a way of integrating all the theories.

Netiquette
Netiquette or network etiquette is a set of rules for behaving properly
online (Shea, 1997). These are rules, that may not be strictly enforced or
given. They are regularly followed and are important to keep everyone online
in check.

Virginia Shea published the following guidelines to cover the bases of


netiquette.

 Rule 1: Remember the Human

Through technology, it is no longer necessary to be physically


present to initiate interaction. As convenient as it is, it also creates a
barrier between people that makes communication tricky. Even with
emoticons and emoji‟s, electronic devices still can‟t quite convey
messages the way face-to-face conversation does. Without facial
expressions, the tone of voice, gestures, and body language, it is easy to
forget that those at the receiving end of communication are actual human
beings. Somehow this electronic barrier gives people misplaced boldness
resulting to a cruder and often offensive behavior online or over the
phone.

Putting oneself in other‟s shoes can put everything in right


perspective. Remember that the receiver on the other side of your
computer or phone screen is another person vital to avoiding hurting
other‟s feelings. If you‟re thinking of posting something online or sending
a text message that you‟d rather not say out loud to someone, it is best to
rethink. Empathy is one of the most powerful motivations for some basic
decency online.

13
 Rule 2: Adhere to the same standards of behavior online that one follows
in real life.

“When the cat goes away, the mouse comes out to play”, is perhaps
the simplest anecdote explaining human nature‟s approach in obeying
the rules. Just as the mouse only plays when the cat is not around to
catch him, so does the human only abides with but the law for fear of
being caught. Somehow, cyberspace has become the playground for
which cats rarely- if at all- exist. Chances of being caught in something
illegal on the web are extremely slim. Most people believe they can get
away with anything online because of the anonymity electronic devices
can offer - a luxury people do not have in real life. In real life, actions
have consequences, something one would be wise to remember in
cyberspace. Good netiquette is derived from the same standards set in
real life. If your online behavior doesn‟t meet that, it would be good to
reevaluate your actions.

 Rule 3: Know where you are in cyberspace

The cyberspace may be as vast as the actual outer space. With the
amount of information and the wide array of users online, divisions are bound
to come up depending on domains. While there may be millions of active
domains on the web, they can easily be categorized according to content or their
consumer. Acceptable behavior varies on the domain you are on. If posting daily
accounts of your life is acceptable on blogging domains, it is improper on
academic ones.

 Rule 4: Respect other people’s time.

There are 24 hours in a day and nowadays, these hours seem to be


not enough. Whenever a person posts something online or sends a
message to someone, he or she is taking precious minutes from the
already limited time of another. It is important to ensure that one is not
wasting it by delivering nonsense or unsolicited information.

 Rule 5: Make oneself look good online.

People, in general, have a natural desire to be liked. Even on social


media platforms, getting several likes on posts, or hearts on photos, can
definitely make anyone‟s day. This doesn‟t mean posting travel photos of
exotic locations, or sharing one‟s fine dining experience, for the purpose
of making other nervous. Making oneself look good online means
appearing as a decent, smart, and well-rounded individual through his
posts.

14
It is wise to ensure that whatever one writes is free from any
grammar and spelling errors. Remember that sentence construction is
subject to strict scrutiny. It wouldn‟t hurt to proofread what one wrote
before posting or sending them. If a person is bilingual or multilingual
and favors one language over the other in writing, it is best to stick to
that. For example, if one is fluent in both Tagalog and English, but write
more eloquently in the former, then simply write in Tagalog instead of
struggling to write in English.

 Rule 6: Share expert knowledge.

Both the great and terrible beauty of new media lies in its
information crown sourcing. Anyone with access to the internet can share
data and information to the world. While this raises credibility issues
among many data found online. It also increases the number of accurate
facts contributed by experts.

 Rule 7: Help keep flame wars under control.

“Flaming” is what people do when they express a strongly held


opinion without holding back any emotion. (Shea, 1997) One good
example would be sharing strong political views through social media
platforms. Since not everyone shares the same beliefs and supports the
same parties, the conflict between differing groups arises. This is called
flame wars. Exercising one‟s right to self- expression online is not bad
netiquette on its own, in fact, it is normal. If wars like these are dragged
on or are blown out of proportion, then they become a problem. Even if it
would be amusing to some, propagating flame wars and refusing to let
them die out by adding fuel to the fire violates basic netiquette. Keep in
mind that having the right speech and expression does not give anyone
the right to crucify others with a different view. Opinions are always
allowed to be voiced online but at the end of the day, everyone just have
to agree and to disagree.

 Rule 8: Respect other people’s privacy

People‟s dependence on social media has put everyone‟s lives under


a microscope. Even so, privacy still remains a right that needs to be
asserted. Personal emails should be treated as regular mails, only to be
read by whom it was addressed to. No one should access social media
profiles of others without their consent. Let anyone choose what
information to share and who to share them online. Respecting other
people‟s privacy is not just good netiquette, it is everyone‟s responsibility.

15
 Rule 9: Don’t abuse one’s power

The cyberspace requires experts to be further developed and


constantly maintained. These experts have more power than any regular
costumer. Some can have access to other‟s personal information, but this
doesn‟t give them right to exploit them for any selfish reasons. Some can
write a few complex codes and give them access to personal emails, but
does not give them the right to read them. Bottom line is if one has been
given some authority over online networks he or she must not use it out
of the context of one‟s job. Power, even if it is as small as being entrusted
with a Facebook password, must not be abused.

 Rule 10: Be forgiving of other people’s mistakes.

There have been no truer words spoken than the words “No one is
perfect.” It is true that people make mistakes, even online. So be forgiving
of the other people‟s mistakes. Avoid being critical towards the
grammatically challenged. Be tolerant of the stuff that seems nonsense.
Be reasonable when someone tries to pick a fight. If one points out a
mistake, or corrects someone, it should be done politely. Do not shame
others by broadcasting it publicly, private message or emails can still get
one‟s point across to someone. Forgiving other people for their mistakes
isn‟t just good netiquette, it is also basic good manners.

Strengthening the Gap


Directions: Read each statement and determine what issue is being
described. Write the letter of the correct answer on your answer sheet.
a. Cyberbullying b. Addiction c. Digital Divide d. Netiquette
e. Copyright f. Obscenity/ Pornography g. Privacy
h. Defamation i. Hacking

1. Ana posted in her Facebook that Cassey stole something from their
classmate without any proof.
2. Max copied a few lines from the editorial from a newspaper without giving
citations for reference.
3. Cathy gets banned after she posted a photo where she was seen almost
naked.
4. One should act and observe proper behavior when doing something
online such as posting and commenting on posts.
5. Andre‟s mother is having a hard time learning how to manipulate the
smartphones given to her.

16
6. John spend most of his time playing online games that he forgets to
perform some of his tasks.
7. Mark gets mad upon reading the hilarious comments of his friends to the
photo he posted in Facebook.
8. Matt, a student who lived in a far-flung barangay, is having hard time
connecting to the internet to do research for his project.
9. Edna stalks Careen‟s post and even tried to hack her account.
10. Andrew makes sure to do professional transactions private over the
internet to keep the confidentiality of the transactions.

Wrapping Up to Go

Directions: Write YES if you agree with the statement and NO if you
disagree with the statement. Write your answer on your answer sheet.
Statement Agree Disagree
1. The only barrier to overcome digital divide is to
have higher income.
2. Digital divide happens only in poor countries.
3. Technology has advantage and disadvantage to
human‟s life.
4. Eating and sleeping late due to playing online
game has no adverse effect to one‟s health.
5. Computer addiction can change the behaviour of
a person.
6. The most vulnerable in computer are the young
individuals.
7. It is right to express our emotions in social media,
8. Mostly young people are victim of cyberbullying.
9. The anti-bullying Act protects the bully.
10. Cyberbullying can be avoided.
11. Saying false statement to someone can lead to
legal issue.
12. Internet exposure may lead to obscene features in
the internet.
13. Parents have a major role in guiding the children
about online activities.
14. In social media, there is no „privacy‟.
15. One must grab information online even without
citing the source.
16. There should be time limit in using online

17
Statement Agree Disagree
activities.
17. Only those living the far-flung places can
experience digital divide.
18. Being computer addict can affect someone‟s
health condition.
19. Nowadays, online activities made the relationship
of the family members stronger.
20. Always think before we post anything in social
media.

Were you able to get all correct answers? How was your result
compared to the first activity? Check your answers using the Answer Key.

Relating to Real Life


Activity 1: Our Ethical Orientation
Issues can be avoided if one becomes responsible by observing basic
social orientation. The following are the examples of basic ethical
orientation. Read each statement and determine what basic ethical
orientation is being observed. Refer to the box for the answers. Write the
letter of your answer on your answer sheet.

a. Divine Command Theories e. Ethics of Respect


b. Ethics of Conscience f. Utilitarianism
c. Ethical Egoism g. Ethics of Justice
d. Ethics of Duty h. Virtue Ethics

1. Your posts or comments are based on your conscience.


2. If we are good persons, it is assumed that we also have good decisions.
3. All we do is based on what God wants us to do.
4. When we treat our fellowmen equally, it doesn‟t mean that we will treat
them in the same way.
5. Respect begets respect.
6. We don‟t compete with others because our greatest competitor is
ourselves.
7. Ethics is about doing our duty and fulfilling it right.
8. It is centered on the idea that what we do is for making this world a
better place to live in.
9. We make decisions with considerations that we won‟t hurt anyone.
10. If we see a post on social media, we consider their rights and privacy.

18
Activity 2: Let’s Campaign!

1. You are going to create a Campaign Ad (it is a set of advertisement which


focus in a single message with a certain objective need to achieve). You
can create the Ad in a form of video or poster slogan or infographics.
2. The main objective of a Campaign Ad is to combat the problems of digital
divide, computer addiction and cyber bullying.

CRITERIA EXCELLENT Satisfactory Fair


(5 points) (3 points) (1 point)
MESSAGE The information of The information of The information of
the Ad is complete. the Ad can be the Ad is difficult to
Its ideas are clear understood but at comprehend. It is
and are easily some point can not clear but shows
understood by bring confusion to effort to deliver the
viewer. the viewer. message.
INFORMATIVE/ The data are all The data are almost The data have a few
IMAGERY supported with supported with supporting
references and have references and the references and have
images which are images have less images
greatly connected to average connection connected to the
the Ad. to the Ad. Ad.
PERSUASIVENESS The Ad clearly uses The Ad has much The Ad has a
a persuasive tool in more sustainable glimpse of a
delivering a tone of persuasive tool persuasive tool;
conviction however, the
delivery of the Ad
makes it lack
conviction.
Rubric Source: https://www.rcampus.com/rubricshowc.cfm?code=T2XWA6X&sp=true&

Checking the Target

Directions: Read each statement. Write only the letter of your answer on
your answer sheet.
1. For parents whose kids are engaged in social media, what should be done
to make the kids avoid exposure to explicit contents?
a. Parents must spend time guide their kids on the use of social media.
b. Parents must turn on the safe search mode of the social media.

19
c. Parents must check from time to time the online activities of their
kids.
d. All of the above.

2. In order to protect one‟s privacy over social media, one must:


a. Accept all people sending friend requests.
b. Post everything in social media.
c. Send the message directly to whom the message is concerned.
d. Tag all your friends in your current social media status to gain more
„likes‟.

3. Jerson violates a copyright issue, thus he commits ______.


a. Pornography b. Slander c. Disrespect d. Plagiarism

4. Ana wants to use a portion of the text from the book for her write-up for a
school publication. What should she do to avoid plagiarism?
a. Just copy the write-up, after all the real owner won‟t be able to read it.
b. Copy and rewrite the content of the write-up.
c. Use the text and cite the name of the writer.
d. None of the above.

5. Andrew spends 10 hours each day playing online games, checking online
activities and watching movies. With this daily online activities, he
seldom performs his obligations. With this, Andrew is now suffering from
what kinds of disorder?
a. Addiction b. Dependency c. Misinformation d. Abuse

6. It is a law which protect the bullied from a bully. It is known as


Anti-Bullying Act.
a. Republic Act 10175 c. Republic Act 10672
b. Republic Act 10627 d. Republic Act 1076
7. Mark keeps on sending mean messaging to Kris and this really hurt him
badly. This is the product of _______________.
a. Addiction c. Harassment
b. Digital divide d. Cyberbullying

8. This kind of written and spoken statement can injure someone‟s


reputation is called ______.
a. Privacy b. Defamation c. Obscenity d. Bullying

9. What does the advocacy tag „think before you click‟ mean?
a. One must think first whether the post is beneficial to others or not
before posting online.

20
b. One must double check the information before he/ she shares it on
Facebook.
c. One must consider first if the post is necessary or not for posting.
d. All of the above.

10. To protect social media invaders, what necessary action/s should be


done?
a. Do not give the email and social media account passwords to anyone
even to friends.
b. One using a public computer should always make sure to log out
before turning the computer off.
c. Set the audience or the viewers whom you like to see your social
media post/s.
d. All of the above.

11. It refers to the inequalities of the different sectors in the community to


access, use of or knowledge of information and communication
technology.
a. Digital advancement c. Digital Literacy
b. Digital divide d. Digital skills

12. This is a factor that creates digital divide.


a. Age b. Education c. Occupation d. All of the Above

13. It is an action to bridge digital divide.


a. Attend technological trainings to develop the skills.
b. Read a lot of books in the library to access information.
c. Manipulate technology like smartphone, computer and internet.
d. Both a and c

14. The following statements are reasons why digital divide exists except
one.
a. The person cannot afford to access the technology.
b. The person has a strong motivation to learn how use the technology.
c. The person refuses to have knowledge of the advance technology
d. The person has less information about the benefits of technology.

15. The group of individuals having high opportunity to acquire digital skills.
a. professional and students
b. grandparents at home
c. group of disabled person
d. people living in rural area

16. It refers to the excessive use of technology like gaming.

21
a. Computer addiction c. Digital divide
b. Cyberbullying d. Digital skills

17. Which of the following is a factor which leads to computer addiction.


a. depression c. social acceptance
b. loneliness d. All of the above

18. It is a type of computer addiction when one spends much time in online
gaming or gambling.
a. compulsion c. Cyber relationship
b. cybersex d. Information overload

19. These are symptoms of a person experiencing computer addiction except


one.
a. anxiety and distress c. defensive and dishonesty
b. sleep disorder and back pain d. social acceptance and compulsion

20. It is a way to fight computer addiction.


a. Spend more time with family and friends and do non- computer
related activities.
b. Turn off the cellphone when somebody call to avoid using the gadgets.
c. Keep listening to music while playing online games.
d. all of the above

Enriching the Skill

Write an action that you can do using the acronym “P.R.O.M.I.S.E.”


which contains ways/tips you can do in order to avoid the negative effects of
digital divide, computer addiction and cyber bullying. Write your answer on
your answer sheet.

P-
R-
O-
M-
I-
S- 22

E-
3. D
4. C
5. A
6. B
23
7. C
8. B
9. D
10. D
11. B
12. D
13. D
14. B
15. A
16. A
17. D
18. D
19. D
20. A
Trying the Challenge Strengthening the Relating to Real Life
1. B Gap 1. B
2. C 2. I
1. H
3. A 3. A
2. E
4. A 4. G
3. F
5. C 5. E
4. D
6. B 6. C
5. C
7. C 7. D
6. B
8. A 8. F
7. A
9. A 9. B
8. C
10. C 10. E
9. I
10. G
Finding the Score
References
 “Ad Online Campaign Basic,” Wordstream Online Advertising
 Ken Tancasis, ”Talking About MIL Issues My Way,” Defying Digital divide, Digital
addiction and Cyberbullying, August 25, 2016,
https://preciousjadeasumbrado.blogspot.com/2016/08/defying-digital-
dividedigital.html?fbclid=IwAR3vp7PuSj1A7P4Ii_RFamnNYLNV3GMCVRLSnKKn3V
Ww8li afw4PPOx_zzs
 Jan A.G.M Van DIJK, ”The Evolution Of Digital Divide The Digital Divide turns to
Inequality of Skills and Usage,” Digital Enlightenment Yearbook 2012:57-61
accessed July 7,2020, doi10.3233/978-1-61499-057-4-57
 Ramesh Rao, “Digital Divide: Issues Facing Adult Learners, ”Computer and
Information Science , Vol. 2, No1. February 2009: 132-133, accessed July 6,2020,
www.ccsenet.org/journal.html
 George Dotterer, Andrew Hedges, and Harrison Parker, ”The Digital Divide In The
Age Of Connected Classroom How Technology Helps Bridge the Achievement
Gap,” Net.Ref, January 14, 2017, accessed July 5,2020,
 https://www.net-ref.com/wpcontent/uploads/2016/01/Bridging-the-Digital-
Divide-NetRef-White-PaperFINAL.pdf
 Phoebe Dey ,”Curbing Bullying and Teasing in the Classroom Institute”
Antibullying” program is Changing Attitudes around Alberta, University of Aberta
Folio, December 1, 2000, Vol. 38 No.1
 “ Computer /Internet Addiction Symptoms, Causes and Effects,” American
Addiction Center Research,
 https://www.psychguides.com/behavioral-disorders/computerinternet-
addiction/ “Implementing Rules and Regulations of Republic Act No.
10627,”GovPH, December 13, 2013,
 https://www.officialgazette.gov.ph/2013/12/13/implementing-rules-
andregulations-of-republic-act-no-10627
 https://www.merriam-webster.com/dictionary/bullying

24
 CluadiaMartinez,”How to Prevent Cyberbullying,”PureVPN, June 17, 2020,
https://www.purevpn.com/blog/how-to-prevent-cyber-bullying/
 Emmanuel Vargas, Alexander A. Hernadez, Praxides S.
Marquez,JaminNiguidulaJonathanCaballero,”SeniorHighSchool Students
Cyberbullying Experience: A Case of University in the Philippines,” Research Gate;
May 7, 2017
 https://www.researchgate.net/publication/324692240_Senior_High_School_Stude
nts_Cyberbullying_Experience_A_Case_of_University_in_the_Philippines
https://www.bidceosummit.com/what-causes-an-addiction-to-computersor-the-
web/ Rie Takumi, “80% Of Young Teens In The Philippines Experience
Cyberbullying, ”GMA News Online, March 30, 2016
 https://www.gmanetwork.com/news/lifestyle/parenting/560886/80-of-
youngteens-in-phl-experience-cyberbullying-survey/story/

25

You might also like