MIL - Quarter 3 - Module 8
MIL - Quarter 3 - Module 8
DEPARTMENT OF EDUCATION
Region I
Schools Division Office I Pangasinan
Pangasinan National High School
Lingayen, Pangasinan
Cite practical situation when to apply knowledge in intellectual property, copy right, and fair use guidelines.
Create a campaign add to combat digital divide, addiction, and bullying
(MIL11/12IMIL1IIIa-2)
Prepared by:
ROMASANTA P. TORIO
SHS TEACHER
1
Lesson
Legal and Ethical Issues in
8 Media and Information
What I Need to Know (Learning objectives)
By the end of this lesson, you will:
1. Cite practical situation when to apply knowledge in intellectual property, copyright,
and fair use guidelines; and
2. Create a campaign ad to combat the digital divide, addiction, and bullying
Intellectual Property
Intellectual property (IP) refers to creations of the mind, such as inventions; literary
and artistic works designs and symbols, names, and images used in commerce
Types of Intellectual property
Copyright
Patent
Trademark
Insdustrial design
Geographical origin
Copyright - a legal device that gives the creator of a literary, artistic, musical, or other creative
work the sole right to publish and sell that work. Copyright owners have the right to control the
reproduction of their work, including the right to receive payment for that reproduction. An
author may grant or sell those rights to others, including publishers or recording companies.
Violation of a copyright is called infringement.
1. The Ghost Writer -The writer turns in another’s work, word-for-word, as his
or her own.
2. The Photocopy- The writer copies significant portions of text straight from
a single source, without alteration.
3. The Potluck Paper- The writer copies from different sources and altersthe
sentences to make them fit together while retaining most of the original
phrasing.
4. The Poor Disguise- The writer has altered the paper’s appearance slightly
by changing keywords and phrases.
5. The Labor of Laziness - The writer takes the time to paraphrase most
of the paper from other sources and make it all fit together.
6. The Self-Stealer- The writer “borrows” generously from his or her previous work.
Sources Not Cited (But still plagiarized)
1. The Forgotten Footnote - The writer mentions an author’s name for a source, but
neglects to include specific information on the location of the material referenced.
2. The Misinformer - The writer provides inaccurate information regarding
the sources, making it impossible to find them.
3. The Too-Perfect Paraphrase - The writer properly cites a source but neglects to
put in quotation marks on a text that has been copied word-for-word, or close toit.
4. The Resourceful Citer- The writer properly cites all sources, paraphrasing, and
using quotations appropriately. The catch? The paper contains almost no original
work!
5. The Perfect Crime- The writer properly quotes and cites sources in some places,
but goes on to paraphrase other arguments from those sources without citation.
Fair Use
Fair use means you can use copyrighted materials without a license only for
certain purposes. These include:
1. Commentary
2. Criticism
3. Reporting
4. Research
5. Teaching
Guidelines for Fair Use
• A Majority of the content you create must be your own.
• Give credit to the copyright holder
• Don’t make money off of the copyrighted work
Rule 2: Adhere to the same standards of behavior online that you follow in real
life
Good netiquette is derived from the same standards set in real life. While it can be
argued that standards of behavior may be different in the virtual world, they certainly should
not be any lower. In real life, we are constantly reminded to be respectful to other people,
mindful of our words, follow the law and other societal rules. This holds true for cyberspace
etiquette as well. Further, actions have consequences. Whatever is deemed illegal or
irresponsible in real life is most probably deemed the same in the online world. While the
chances of getting caught or punished may be slim, your accountability and liability for your
actions aren’t totally erased. Thus, you should do your best to act within the laws and ethical
standards in the online environment just as you would in real life.
Wherever you are in the online world, you may be exposed to some private or
personal information that needs to be handled with care. Ask yourself: What do you think
would happen if this information “got into the wrong hands?” Embarrassment? Hurt feelings?
Loss of a job? Just as you expect others to respect your privacy, so should you respect the
privacy of others as well.
Internet Addiction
Merriam-Webster Dictionary defines addiction as “a compulsive, chronic, physiological
or psychological need for a habit-forming substance, behavior, or activity having harmful
physical, psychological, or social effects.” When we speak of addiction, we commonly
associate it with substances like recreational or illegal drugs. However, due to the widespread
use of the Internet, the digital age has ushered an addiction that has become a growing
concern in society – Internet Addiction.
Cyberbullying
By definition, cyberbullying is a type of offensive action toward another which takes
place using electronic technology (Liquigan, 2016). This occurrence can trigger traumatic
experiences for the victims, just like bullying in real life. Cyberbullies post or send hatefully
and mean messages as well images which are deliberately meant to mock, ridicule,
embarrass, hurt, or attack a person. What’s worse about cyberbullying is that online content
used by cyberbullies may stay on the Web for a long time. Even if the original content may
be deleted, screenshots or copies of it may continue to circulate on social media or on the
Internet. This makes it harder for victims to move forward if the things that traumatize them
constantly resurfaces on the Web. Cyberbullying and bullying, in general, also feed “a
continuum of damaging behavior.” Victims of cyberbullying are more likely to abuse drugs
and alcohol, skip school, receive poor grades, and experience low self-esteem and health
problems.
6
What I Can Do (Application)
arketing products and services but also in lobbying certain advocacies and campaigns. In this activity, you are to create an infographics s
For Printed Modular Distance Learning, draw your output using long coupon bond.
Example
Name: Date: Grade/Section: Score:
I. MULTIPLE CHOICE. Identify the correct answer to the following questions. Write the
letter of your choice in the space before the number.
1. This is an act or instance of using or closely imitating the language and thoughts of
another author without authorization
a. Intellectual Property c. Plagiarism
b. Copyright d. Fair Use
3. Fair use means you can use copyrighted materials without a license only for certain
purposes. These reasons include all choices EXCEPT:
a. Reporting c. Research
b. Scamming d. Teaching
4. This is a type of plagiarism where the writer copies from several different sources,
tweaking the sentences to make them fit together while retaining most of the original
phrasing.
c. The Ghost Writer c. The Perfect Crime
d. The Misinformer d. The Potluck Paper
5. This is a type of plagiarism where the writer properly quotes and cites sources in some
places, but goes on to paraphrase other arguments from those sources without
citation.
a. The Ghost Writer c. The Perfect Crime
b. The Misinformer d. The Potluck Paper
6. This refers to having the appropriate knowledge and skills to effectively use digital
technologies to communicate with others, participate in society, and create and consume
digital content.
a. Netiquette c. Digital Citizenship
b. Netizenship d. Media consumerism
7. This is what people do when they express a strongly held opinion on the Internet without
holding back any emotion
a. Flaming c. Arguing
b. Talking d. Discussing
10. All of these choices are factors contributing to Internet addiction, EXCEPT:
a. Depression c. Social belongingness
b. Anxiety d. Lack of parental guidance
II. Read each scenario below and identify if the situation manifests good or bad netiquette.
Write G for good netiquette and B for bad netiquette.
1. Alexi wants to post a comment to an online message board. She really wants
to emphasize her opinion. She responds in ALL UPPERCASE LETTERS!
2. Tina had a small disagreement on Facebook with her friend about a certain
political issue. She noticed that her friend started to get personal with her
responses. Instead of responding with anger, Tina told her friend that they
could just agree to disagree.
3. David is an Internet expert. He reads a question from a newcomer in an online
discussion group. For him, the answer is easy, but the “newbie” is having
trouble. He responds, “Hey, newbie! Can’t you read a book? Don’t ask such a
dumb question!”
4. Andrew’s laptop got broken, so he borrowed his classmate’s for an assignment
he had for school. As he opened the Internet browser, his classmate apparently
left his Facebook messenger open. Curious, Andrew browsed through his
classmate’s messenger.
5. Aubrey noticed a factual error on her Facebook friend’s post. Instead of shaming
or mocking her, she privately messaged her friend and politely told her that her
post has an error and that she should correct it.
References:
I. Books
1. Media and Information Literacy by Edward D. Gonzales