You are on page 1of 7

HOW IS INFORMATION CATEGORIZED?

WHAT IS INFORMATION?
● "Information is knowledge obtained from investigation, study, or instruction." Source:
Merriam Webster
● Another description of information is that it is facts provided or learned about
something or someone.

SCHOLARLY
- Scholarly Information is information drawn from the research of field experts

Sources of Information

Primary Source
- Firsthand accounts

•Theses & dissertations. •Letter


•Diaries. •Speeches
•Interviews. •Photographs
•Original works of art & literature

Secondary Source
- Anything that comments on analyzes, or tackles a primary source.

•Textbooks
•Biographies
•Critical reviews

Tertiary Source
- Are sources that refer to a primary or secondary source

•Dictionaries
• Handbooks
•Tables Encyclopedias
Attribution and Data Triangulation
● These are ways of evaluating information.
● Practices that we can adopt from scientific researchers and journalist

Data Triangulation
● The process of finding two or more sources for the same information.

Attribution
● The identification of the source of information.

COMMON CODES IN JOURNALISM WHEN GATHERING INFORMATION

On the Record
● This is the strongest form of attribution because the identity of the source of
information is fully known.
● This allows other journalists or researchers to verify the information directly from the
attributed source.

-According to the Associated Press Standards & Practices, information on the record is
pursued whenever possible.
-They have strict guidelines when dealing with information that is not on the record.

On background
● This is when a piece of information is said to be from an "anonymous source".
● However, clues about the "source who refuse to be identified," like position in
organization or relation to the story may be revealed.
● This is strengthen when verified through other sources, preferably one or more on
record.

-Philippine press freedom laws protect journalist from being compelled by the state to reveal
the identity of their sources (R.A No. 53 as amended by R.A. No. 1447).
-This upholds the importance of the freedom of the press and news media as the watchdog
of the people.

Deep Background
● This means that the source cannot be identified in any way at all.
● Whistleblowers who want to reveal wrongdoings often share deep background
information for their safety.

Off the record


● This means that the information may not be used at all.
● However, Guy Bergstrom warns that this common term has become confusing and
even if off the record is not published, it may be passed off as gossip.
LEGAL, ETHICAL, AND SOCIETAL ISSUES IN MEDIA AND INFORMATION

Intellectual Property in International and Local Context


● Intellectual property, or IP, as defined by the World Intellectual Property
Organizations (WIPO) is the "creation of the mind, such as inventions, literary and
artistic works, designs and symbols, names, and images used in commerce.”

● Since the products of human intellect have a direct influence on human civilization
and on the development of societies, there should be safeguards on intellectual
property.

● Laws are enacted to enforce respect and recognition toward the fruits of other
people's ingenuity. Inventions or creations serve some benefits to users, thus, in the
logic or commerce of business, inventors and creators should be properly
compensated for their contribution.

● If their intellectual property right is protected, people will be motivated to contribute


more by continuously inventing and creating things for the public good in the spirit of
fair play.

COPYRIGHT
● a legal device that gives the creator of a literary, artistic, musical, or other creative
work the sole right to publish and sell that work.

How long does copyrighted works are protected?


● Copyright protection stays up to at least 50 years (in the Philippines) after the death
of the author/creator.

Economic Right
● This are meant to ensure that the creator of a work will be paid by other parties if the
latter use their work.

Happy Birthday song


● Owner: Warner/Chappell Music
● Earns: 2 Million Dollar a year.
● This is copyrighted in the US before being made public domain by an American court
in June 2016.

PLAGIARISM
● an act or instance of using or closely imitating the language and thoughts of another
author authorization; without the representation of that author's work as one's own,
as by not crediting the originál author

FAIR USE is a legal concept that allows the reproduction of copyrighted material for certain
purposes without obtaining permission and without paying a fee. Purposes permitting the
application of fair use generally include review, news reporting, teaching, or scholarly
research.
THE FOUR FACTORS OF FAIR USE:

1. The purpose and character of the use, including whether such use is of commercial nature
or is for nonprofit educational purposes Courts typically focus on whether the use is
"transformative." That is, whether it adds new expression or meaning to the original, or
whether it merely copies from the original.
2. The nature of the copyrighted work Using material from primarily factual works is more
likely to be fair than using purely fictional works.
3. The amount and substantiality of the portion used in relation to the copyrighted work as a
whole Borrowing small bits of material from an original work is more likely to be considered
fair use than borrowing large portions. However, even a small taking may weigh against fair
use in some situations if it constitutes the "heart" of the work.
4. The effect of the use upon the potential market for, or value of, the copyrighted work
- Uses that harm the copyright owner's ability to profit from his or her original work by
serving as a replacement for demand for that work are less likely to be fair uses.

ETHICAL

NETIQUETTE - refers to observing proper etiquette as you engage in activities over the
Internet.
- a combination of the words network and etiquette and is defined as a set of rules for
acceptable online behavior. Similarly, online ethics focuses on the acceptable use of online
resources in an online social environment.

Core Rules of Netiquette


● Netiquette, or network etiquette, is concerned with the "proper" way to communicate
in an online environment. Consider the following "rules," adapted from Virginia
Shea's The Core Rules of Netiquette, whenever you communicate in the virtual world

Rule 1: Remember the Human


● When communicating electronically, whether through email, instant message,
discussion post, text, or some other method, practice the Golden Rule: Do unto
others as you would have others do unto you.

Rule 2: Adhere to the same standards of behavior online that you follow in real life
● While it can be argued that standards of behavior may be different in the virtual
world, they certainly should not be lower. You should do your best to act within the
laws and ethical manners of society whenever you inhabit "cyberspace.”

Rule 3: Know where you are in cyberspace


● "Netiquette varies from domain to domain." (Shea, 1994) Depending on where you
are in the virtual world, the same written communication can be acceptable in one
area, where it might be considered inappropriate in another.

Rule 4: Respect other people's time and bandwidth


● Electronic communication takes time: time to read and time in which to respond.
Most people today lead busy lives, just like you do, and don't have time to read or
respond to frivolous emails or discussion posts..

Rule 5: Make yourself look good online


● You will, however, be judged by the quality of your writing, so keep the following tips
in mind:
● Always check for spelling and grammar errors Know what you're talking about and
state it clearly
● Be pleasant and polite

Rule 6: Share expert knowledge

● The Internet offers its users many benefits; one is the ease in which information can
be shared or accessed and in fact, this "information sharing capability is one of the
reasons the Internet was founded. So in the spirit of the Internet's "founding fathers,"
share what you know!

Rule 7: Help keep flame wars under control


● Don't feed the flames; extinguish them by guiding the discussion back to a more
productive direction.

Rule 8: Respect other people's privacy


● Depending on what you are reading in the virtual world, be it an online class
discussion forum, Facebook page, or an email, you may be exposed to some private
or personal information that needs to be handled with care. Perhaps someone is
sharing some medical news about a loved one or discussing a situation at work.

Rule 9: Don't abuse your power


● Just remember: knowing more than others do or having more power than others may
have does not give you the right to take advantage of anyone. Think of Rule 1:
Remember the human.

Rule 10: Be forgiving of other people's mistakes


● At some point, you will see a stupid question, read an unnecessarily long response,
or encounter misspelled words; when this happens, practice kindness and
forgiveness as you would hope someone would do if you had committed the same
offense.

SOCIETAL ISSUES

REPUBLIC ACT NO. 10175

Cybercrime Prevention Act of 2012


● Is a law in the Philippines approved on September 12, 2012, which aims to address
legal issues concerning online interactions and the Internet.
● Among the cybercrime offenses included in the bill are cybersquatting, cybersex,
child pornography, identity theft, illegal access to data and libel.
REPUBLIC ACT NO. 10175

Republic Act No. 9995 - Anti-photo Voyeurism Act of 2009


Republic Act No. 9775 - Anti-child Pornography Act of 2009
Republic Act No. 9208 - Anti-trafficking in Persons Act of 2003
Republic Act No. 8732 - E-commerce Act of 2000
Republic Act No. 8484 - Access Device Regulation Act of 1998
Republic Act No. 4200 - Anti-wiretapping Law

CYBERCRIME - refers to the criminal activities carried out by means of computers or the
Internet

CYBERBULLYING - the use of electronic communication to bully a person, typically by


sending messages of an intimidating threatening nature

HACKING - refers to the practice of modifying or altering computer software and hardware
to accomplish a goal that is considered to be outside creator's objective. of the original

ILLEGAL DOWNLOADING - refers to obtaining files that you do not have the right to use
from the Internet.

DIGITAL PIRACY - the practice of illegally copying and selling digital music, video, computer
software, etc.

IDENTITY THEFT - is the deliberate use of someone else's identity, usually as a method to
gain a financial advantage or obtain credit and other benefits in the other person's name,
and perhaps to the other person's disadvantage or Loss

CYBER DEFAMATION - is an unprivileged false statement of fact which tends to harm the
reputation of a person or company

2 Types of Defamation

1. Libel - written
2. Slander - verbal

CYBERSEX - is a virtual sex encounter in which two or more people (connected remotely
via internet) send each other sexually explicit contents or sexually explicit acts

CHILD PORNOGRAPHY - is a form of child sexual exploitation

CYBERSQUATTING - is registering, trafficking in, using or an Internet domain name with


bad faith intent to profit from the goodwill of a trademark belonging to someone else.

INTERNET ADDICTION - According to article HealthGuide.org, internet an at addiction,


"otherwise known as computer online Internet addiction, addiction, or addiction disorder
(IAD) is an impulse-control problem.”
CYBERSPACE - refers to the virtual computer world, and more specifically, is an electronic
medium used to form a global computer network to facilitate communication online

CYBER- relating to, or involving computers or computer networks

You might also like