You are on page 1of 10

St. Joseph’s Academy of Malinao, Aklan, Inc.

(A Catholic Institution)
Malinao, Aklan, Philippines

Media and Information Literacy

Chapter 11: What are the Purpose of Copyright? How Can I Use it to Protect My
Work?

Copyright

The Intellectual Property Office of the Philippines (IPO Phil) defines copyright as the “legal
protection extended to the owner of the rights in an original work.” This means that owner
or creator of an idea-expressed through his or her original work---has the sole right to use and
sell it (through publication or reproduction). Copyright protection stays up to at least 50 years (in
the Philippines) after the death of the author/creator.

According to the IPO, the following works are protected by the intellectual property code:
• books, pamphlets, articles, and other writings
• periodicals and newspapers
• lectures, sermons, addresses, and dissertations prepared for oral delivery, whether or
not reduced in writing or other material form
• letters
• dramatic or dramatic-musical compositions, choreographic works, or entertainment in
dumb shows.
• musical compositions, with or without words
• works of drawing, painting, architecture, sculpture, engraving, lithography, or other works
of art; models or designs for works of art
• original ornamental designs or models for articles of manufacture, whether or not
registrable as an industrial design, and other works of applied art
• illustrations, maps, plans, sketches, charts, and three-dimensional works relative to
geography, topography, architecture, or science
• drawings or plastic works of a scientific or technical character photographic works
including works produced by a process analogous to photography; lantern slides
• audiovisual works and cinematographic works and works produced by a process
analogous to cinematography or any process for making audio-visua recordings
• pictorial illustrations and advertisements
• computer programs
• other literary, scholarly, scientific, and artistic works

The same law protects derivative works which include:


• dramatizations, translations, adaptions, abridgments, arrangements, and other
alterations of literacy or artistic works; and
• collections of literacy, scholarly, or artistic works, and compilations of data and other
materials which are original by reason of the selection or coordination or arrangement of
their concerns.

The IPO code grants creators and originators of ideas two types of rights.
Economic rights and Moral Rights

❖ Economic rights
are meant to ensure that the creator of a work will be paid by other parties if the latter use their
work.
Example:
The song “Happy Birthday” which was copyrighted in the United States before being made
public domain by an American court in June 2016. Until then, people needed to pay its copyright
owners, Warner/Chappell Music, before using it in their movie or work. The song earned
Warner/Chappell Music $2 million a year licensing fees.

The IPO list includes:


• reproduction of the work or a substantial portion of the work
St. Joseph’s Academy of Malinao, Aklan, Inc.
(A Catholic Institution)
Malinao, Aklan, Philippines

• dramatization, translation, adaptation, abridgment, arrangement, or other transformation


of the work
• the first public distribution of the original and each copy of the work by sale or other
forms of transfer of ownership
• rental of the original or a copy of an audiovisual or cinematographic work, a work
embodied in a sound recording, a computer program, a compilation of data and other
materials, or a musical work in graphic form, irrespective of the ownership of the original
or the copy which is the subject of the rental.
• public display of the original or a copy of the work
• public performance of the work
• other communication to the public of the work

These instances are listed under Sec. 5 of Presidential Decree No. 492 known as the Decree in
the Protection of Intellectual Property, issued in 1972.

❖ Moral Rights
They are designed to protect the personal connection between the creator originator and the
work they created.
Attribution, on the other hand is the act of ascribing the work to a person-in this case, the
creator-whenever the work is used.

The IPO code further states that the author of a work shall have the right:
• to require that the authorship of the works be attributed to them, in particular, the right
that their name, as far as practicable, be indicated in a prominent way on the copies, and
in connection with the public use of their work;
• to make any alterations of their work prior to, or to withhold it from, publication;
• to object to any distortion, mutilation, other modification of, or other derogatory action in
relation to their work which would be prejudicial to their honor or reputation; and
• to restrain the use of their name with respect to any work not of their own creation or in a
distorted version of their work. (Sec. 34, P.D. No. 49)

To summarize, the entire purpose of copyright law is to protect the rights of the person who
created a particular work—be it a song, a movie, or a computer program-so that they are
properly compensated financially for their work and so that they are recognized as the person
who made that work.

Plagiarism

Merriam-Webster Dictionary's definition of plagiarism is simple: the act of using another


person's words or ideas without giving him/her credit. The University of Oxford offers another
definition: plagiarism is "presenting someone else's work or ideas as your own, with or without
their consent, by incorporating it into your work without full acknowledgement."

Taking it further, Merriam Webster states:


The word “plagiarism” comes from the Latin plagiarius (or) kidnapper. This word, derived
from the Latin plaga (a net used by hunters to catch game), extended its meaning in Latin to
include a person who stole the words, rather than children, of another...
"Many people think of plagiarism as copying another's work or borrowing someone else's
original ideas. But terms like 'copying' and 'borrowing' can disguise the seriousness of the
offense."

Plagiarism, according to the group, is fraud. In addition, based on the dictionary definitions
above, there are three crimes involved in an act of plagiarism: the act of taking someone else's
possession (theft), the act of rewriting and editing to make that work appear as the plagiarist's
(cover-up), and lying about where the idea was obtained (perjury).

Plagiarism.org offers a list of acts considered as plagiarism:


• turning in someone else's work as your own
St. Joseph’s Academy of Malinao, Aklan, Inc.
(A Catholic Institution)
Malinao, Aklan, Philippines

• copying words or ideas from someone else without giving credit


• failing to put a quotation in quotation marks
• giving incorrect information about the source of a quotation
• changing words but copying the sentence structure of a source without giving credit
• copying so many words or ideas from a source that it makes up the majority of your
work, whether you give credit or not.

There are no specific laws penalizing plagiarism, but copyright infringement laws may be used
to prosecute a plagiarist, assuming that the plagiarized material is registered.

Plagiarism.org also lists some acts which may seem common or trivial but which are, in reality,
illegal:
• copying media (especially images) from other websites and pasting them into your own
papers or websites
• making a video using footage from others' videos or using copyrighted music as part of
the soundtrack
• performing another person's copyrighted music (i.e. playing a cover)
• composing a piece of music that borrows heavily from another composition
• scanning or using a photograph of a copyrighted image (i.e. using a photograph of a
book cover to represent that book on one's website)
• recording audio or video in which copyrighted music or video is playing in the
background
• re-creating a visual work in the same medium (i.e. shooting a photograph that uses the
same composition and subject matter as someone else's photograph)
• re-creating a visual work in a different medium (i.e. making a painting that closely
resembles another person's photograph)
• re-mixing or altering copyrighted images, video, or audio, even if done so in an original
way

There are ways to avoid being sued for plagiarism. First, ask permission from the
author/copyright holders usually by sending them a letter or an email explaining how their works
are to be used. Always be transparent and heed the restrictions that they impose. If they refuse,
look for other materials that you can use.

Fair Use

While authors and artists are given protection for the possible exploitation of their work, the IPO
law also provides for what it calls statutory fair uses.

❖ Statutory Fair Uses


are instances or acts which are not considered as copyright infringement even if done without
consent of the copyright holder. These fair uses include the recitation and performance of a
work provided that the material has been lawfully made accessible to the public. The
performance should also be done privately and free or made strictly for a charitable or religious
institution or society. Thus, "Happy Birthday," even when it was still copyrighted, could be sung
at private parties without the party organizers needing to ask permission from Warner/Chappell.
Citation style manuals help students and professionals use their sources properly and avoid
plagiarism issues.

Below are other acts considered as fair use according to the IPR code:
• reproduction of literary, scientific, or artistic works as part of reports of cure events by
means of photography, cinematography, or broadcasting
• inclusion of a work in a publication, broadcast, or other communication to tr public,
sound recording or film, if such inclusion is made by way of illustration for teaching
purposes
• recording made in schools, universities, or educational institutions of a work included in
a broadcast for the use of such schools, universities, or educational institutions
St. Joseph’s Academy of Malinao, Aklan, Inc.
(A Catholic Institution)
Malinao, Aklan, Philippines

• creation of ephemeral recordings by a broadcasting organization by means d its own


facilities and for use in its own broadcast
• any use made of a work by or under the direction or control of the government, by the
National Library, or by educational, scientific, or professional institutions where such use
is in the public interest
• public performance or communication to the public of a work in a place where no
admission fee is charged in respect of such public performance or communication by a
club or institution for charitable or educational purpose on
• any use made of a work for the purpose of any judicial proceedings or for providing
professional advice by a legal practitioner providing professional advice by a legal
practitioner

All of these require the prior consent of the work's creator or the assigned copyright holder. The
use of a copyrighted work for criticism, comment, news reporting, teaching (including multiple
copies for classroom use), scholarship, research, and similar purposes is also considered fair
use.
St. Joseph’s Academy of Malinao, Aklan, Inc.
(A Catholic Institution)
Malinao, Aklan, Philippines

Media and Information Literacy

Chapter 12: What are Some of the Challenges and Issues that New Media
Present? What is My Role in Overcoming Them?

Digital Divide

Refers to the gap among demographics and regions that is determined by whether or not they
have unlimited access to modern information and communications technology. Digital
responsibility an organization of former Silicon Valley employees, says that a digital divide
between the rich and the poor remains despite the increasing affordability of Internet access.

"The digital divide has especially far-reaching consequences when it comes to education. For
children in low-income school districts, inadequate access to technology can hinder them from
learning the tech skills that are crucial to success in today's economy." "The digital divide has
especially far-reaching consequences when it comes to education. For children in low-income
school districts, inadequate access to technology can hinder them from learning the tech skills
that are crucial to success in today's economy."

Stanford Computer Science says that education and income contribute to the digital divide in
America:
"Widening levels of education seem to magnify the digital divide; households with higher levels
of education are increasingly more likely to use computers and the Internet.

The We Are Social report states that in 2017, half of the world's population already use
smartphones, but despite this staggering amount, it is still difficult to pin down a specific number
of Internet users in a particular country because people's access to connected devices continue
to increase at a high rate.

Philippine leaders have promised the expedition of improvements in telecommunications


services inclusive of a comprehensive expansion in Internet connectivity, speed, etc. through
the Department of Information and Communications Technology (DICT). Local
government units have also decided to make connectivity part of their basic services,
supporting the efforts of the national government in its commitment to provide free wireless
Internet access to rural areas utilizing bandwidths usually reserved for other media. "A new
digital divide can arise not from a lack of access to technology, but from a lack of access to the
right people, helpful connection, and correct information. The new digital divide comes not from
a lack of technology, but from not knowing how to use the social networks for the benefit of
learning."

Information Addiction

is described as the compulsive and excessive used information and communication technology.
The desire to get connected for fear of missing out on the latest news regarding one's family
and friends is such a common thing nowadays that it already interferes with daily functions and
social interactions. Gadgets, once treated only as tools, have now become the center, of a
person's life. Some insist that the symptoms are similar to those of substance abuse, such as
excessive use and withdrawal. It has been suggested that additional research be done to
determine whether too much computer use can be called an ailment or a disease, but there is a
general consensus that the issue should be dealt with, and that those who are deep into it
should be helped.

Cyberbullying

The US Center for Disease Control (CDC) defines bullying as "any unwanted aggressive
behavior(s) by another youth or group of youths, who are not siblings or current dating partners,
involving an observed or perceived power imbalance and is repeated multiple times or is highly
likely to be repeated." If the bullying is done using a computing device, however, it is called
St. Joseph’s Academy of Malinao, Aklan, Inc.
(A Catholic Institution)
Malinao, Aklan, Philippines

electronic aggression or cyberbullying. Cyberspace bullying can be done through text


messaging, email, and social media. The CDC says that most cyberbullying victims report not
knowing their attackers due to the anonymity allowed in cyberspace.

According to StopBullying-gov, here are some factors that differentiate cyberbullying from
bullying:
• Cyberbullying can happen 24 hours a day, 7 days a week.
• Cyberbullying messages and images can be posted anonymously and distributed quickly
to a very wide audience. It can be difficult and sometimes impossible to trace the source.
• Deleting inappropriate or harassing messages, texts, and pictures is extremely difficult
after they have been posted or sent.

A bill has been filed at the House of Representatives of the Philippines regarding the definition
and penalization of cyberbullying. It considers the following acts as cyberbullying:
• repeatedly sending offensive, rude, and insulting messages
• distributing derogatory information about the victim
• posting or sending offensive photos of the victim, whether these are digitally altered or
not, or were taken with or without consent, with the intention to humiliate and embarrass
the victim
• breaking into an email, social network, or any electronic account, and using the victim's
virtual identity to send, upload, or distribute embarrassing materials to or about others
• sharing the victim's personal information or any embarrassing information, or tricking the
victim into revealing personal or embarrassing information and sharing to others
• repeatedly sending messages that include threats of harm or engaging in online
activities that cause fear for the victim's safety

Because social media is still a "new" kind of media and cyberbullying is a problem that is still
relatively new to society, strategies for fighting cyberbullying are still in their early stages.
However, as a media and information literate individual, apart from being aware of its existence,
you should also strive to combat it by promoting the ethical use and consumption of media.
St. Joseph’s Academy of Malinao, Aklan, Inc.
(A Catholic Institution)
Malinao, Aklan, Philippines

Media and Information Literacy

Chapter 13: How do I Behave as a Responsible Netizen?

Netiquette

Refers to network etiquette, the operative word being etiquette.


It is defined as “conventional requirements as to social behavior; properties of conduct as
established in any class or community or for any occasion. The British Broadcasting Corporation
(BBC) says that netiquette means “respecting other users’ views and displaying common
courtesy when posting (one’s) views to online discussion groups... As (one becomes involved
with online discussion groups, (they) will find that each group has its own accepted rules of
behavior.

Core Rules of Netiquette

According to Virginia Shea the author of the book Netiquette:


Rule 1: Remember the human.
Rule 2: Adhere to the same standards of behavior online that you follow in real life.
Rule 3: Know where you are in cyberspace.

Rules 1 to 3 are all about reminding netizens that they are conversing with actual people.
According to Shea, the basic question one must answer is: Will you say what you wrote if you
were face-to-face with the person? The first three rules are also about doing what is morally
correct.

Rule 4: Respect other people’s time and bandwidth.

In rule 4, Shea reminds netizens that they “are not the center of cyberspace.” You must respect
other people’s time and keep in mind that the bandwidth is a shared one. Online discussion
groups have rules and one should be sure to follow these.

Rule 5: Make yourself look good online.


Rule 6: Share expert knowledge.
Rule 7: Help keep flame wars under control.

Rules 5, 6 and 7 are all about making sense and being credible. If you are participating in
discussion groups, strive to contribute to the discussion and help in the resolution of conflicts.
Do not add to the confusion by creating discord in discussions. Shea advises netizens to be
pleasant and polite. “Don’t use offensive language, and don’t be confrontational for the sake of
confrontation,” she adds.

Rule 8: Respect other people’s privacy.


Rule 9: Don’t abuse your power.

Rules 8 and 9 encourages us to respect the privacy of other netizens, expressly admonishing
tech-savvy people who hack into social media accounts and emails just to obtain ammunition
against a fellow netizen.

Rule 10: Be forgiving of other people’s mistakes.


Shea’s last rule is all about being lenient to mistakes. Typographical error should be ignored if it
doesn’t change the context of the discussion. Use private messaging if you feel strongly about
pointing out the mistakes made, she advises.
St. Joseph’s Academy of Malinao, Aklan, Inc.
(A Catholic Institution)
Malinao, Aklan, Philippines

Netiquette of Sending

Sending Emails
Message Headers
Body
Attachments

Attachments
There are times when you need to attach documents, photos, or videos to your messages.
Know the file size and the file type that you need to send and take note how the recipient will be
able to access the file. Make sure to mention in your message that you have attached a file in
the email.

Netiquette of Replying

Replying on Email
It is good practice to reply to important emails promptly, especially those that need your
attention immediately.
Replies should be brief and concise, unless the original message demands an explanation.

Replying on Social Media


Refrain from personal abuse. You may express robust disagreement with what someone says,
but don't call them names or threaten them with personal violence.

• Remember that your posts are public. They can be read by your partner, your children, your
parents, or your employer.
• Stay on-topic, especially when you're new. Don't post about football in a hair-care forum or
about hair care in a gardening forum!

Netiquette of Confidentiality

William Stewart states that:


"When you post anything to a public Internet newsgroup, mailing list, or chat room, you
generally give up the rights to the content and any expectation of privacy or confidentiality. In
most countries, anything you post to a public space can be saved, archived, duplicated,
distributed, and published, even years later, by anyone in the same way as a photograph taken
in a public space like a city park."

Asking Permission
Remember that while messages, data, photos, and videos may have been shared by some
people publicly, this does not mean that you can freely use or share these content. The best
way to know is to ask for permission. Take note of the copyright restrictions that might limit your
use of the work.

Sharing Private Information


Refrain from sharing other people's email address, their home addresses, telephone numbers,
bank account numbers, and other personal information. Such information, if accessed by the
wrong people, can do others harm.

Proper netiquette is important in combatting the issues and challenges that have sprung from
the advent of new media, especially social media. As a media and information literate, you must
uphold the concepts discussed in this lesson so that you can help change new media and social
media for the better.
St. Joseph’s Academy of Malinao, Aklan, Inc.
(A Catholic Institution)
Malinao, Aklan, Philippines

Media and Information Literacy

Chapter 14: How Do I Evaluate the Reliability of a Source? Why is Source


Reliability Important?

Importance of Source Reliability

A reliable source is one that is trustworthy and creates an impression of correctness and
professionalism.

Fraudulent Imitations of Information

Information is defined as contextualized data that has the potential to be converted into
knowledge.

According to the Johns Hopkins University Library, fraudulent or unreliable sources can be
classified into three types: propaganda, misinformation, and disinformation.

1. Propaganda is the presentation of facts in a manner that elicits a desired response from its
audience.
Political campaigns and speeches, especially when statements that disparage opposing parties
or political ideologies are made.

2. Misinformation is the unintentional propagation of incorrect information.


Stories that were fabricated to deceive become misinformation when shared by sincerely
misguided individuals with good intentions.

3. Disinformation is the deliberate propagation of incorrect information.


Circulators of disinformation are usually governments or organizations that want to present
certain issues in a drastically different light, or to influence their audience in a way that is
favorable for them.

Criteria for Source Evaluation

A framework for source evaluation was developed by Jan Alexander and Marsha Tate of
Widener University. The framework consists of five criteria that can help consumers of media
and information discern which sources to trust: authority, accuracy, objectivity, currency, and
coverage (AAOCC).

❖ Authority
Refers to the author of the information gathered from a particular source.
Tom Rosenstial classifies news sources into these basic categories:

• Sourceless news - refers to an account that makes no specific mention of where the
information comes from.
• The journalist as eyewitness - refers to an account that is clearly stated to be the
firsthand experience of a journalist.
• Credentialed experts - individuals who have the qualifications that can establish them
as reliable sources.
• Anonymous sources - individuals who have their identity withheld, usually to avoid
potential backlash.

Wikipedia is a free online encyclopedia, the contents of which are built collaboratively by its
users. Considered one of the top 10 most visited websites, it has become a convenient source
of quick information for many. But Wikipedia itself encourages its users to follow these two
simple rules:
(1) Do your research properly and wisely. Remember that any encyclopedia is a starting point
for research, not an ending point.
(2) Use your judgment. Remember that all sources have to be evaluated.
St. Joseph’s Academy of Malinao, Aklan, Inc.
(A Catholic Institution)
Malinao, Aklan, Philippines

❖ Accuracy
a source is considered accurate when its contents are truthful and correct. Publications that are
well-written and free of grammatical errors or misspelled words may be used to gauge the
accuracy of an information source.

❖ Objectivity
a concept closely related to accuracy, objectivity refers to the disinterested, fair, and factual
presentation of information. There may be commercial bias if the news or information seeks to
advertise a product or promote a specific business interest. The question to ask is: Who is
paying for the message?

❖ Currency
Information in certain fields of knowledge is time-sensitive and changes constantly. Science and
technology are good examples of such fields. News on science and technology needs to be
evaluated on the basis of currency because of the constant and rapid developments in this field.
The question to ask is: Is the information old or up-to-date?

❖ Coverage
A source can be considered complete if it is thorough and consistent with prior information on a
particular subject. An information source can also be evaluated on whether it uses other
verifiable sources and reflects knowledge of related literature, with proper attribution.

Prepared by Joseph Isaiah D. Ibardolaza


Subject Teacher

You might also like