Mil Handouts
Mil Handouts
Media
Refers to any information and communication tool
Affect the way we get information
Media Literacy
Ability to read, analyze, evaluate and produce communication in a variety of media forms
Media and Information Literacy
Essential competencies and skill that allow citizens to engage with media and other information providers
Develop critical thinking and life-long learning skills
Media and its Sources:
1. Primary Sources 2. Secondary Sources
– Original materials – Interpretations and evaluations of the primary source
– These sources are unfiltered and unevaluated – Usually contain the “benefit of hindsight”
3. Tertiary Sources
– Information that are already a collection of primary and secondary sources
– can already be filtered and/or evaluated
Multiple Roles of Media
1. Informative Role 2. Educative Role
– media is the source of information – media assists in the understanding
– enables everyone to be an “informed citizen” and comprehension of information
3. Platform Role
– Media is used by different groups, organizations or institutions as a kind of voice
– Media is used as a “platform” where their side of the story is heard
4. Entertainment Role
– Media is used to entertain people
5. Other Roles:
- Adversarial Role – media is used as a “watch dog” for an institution
- Advocacy Role – media became a place where ideas are heard, broadcast or promoted
Information Literacy
A set of abilities requiring individuals to “recognize when information is needed and have the ability to locate, evaluate,
and use effectively the needed information.”
Technology Literacy
Essential 21st century skill
- ability to responsibly use appropriate technology to communicate, solve problems and access, manage, integrate,
evaluate, and create information to improve learning in all subject areas and to acquire lifelong knowledge and skills
- Maybe known as tool literacy
- Ability to use digital technology, communication tools or networks to locate, evaluate, use and create information
- Ability to understand and use information in multiple formats from a wide range of sources when it is presented via
computers and to a person’s ability to perform tasks effectively in a digital environment
Digital Native
- One who is born into the digital age arbitrarily, applied to children after 1980
Digital Immigrant
- One who adopts technology later in life
Information and Communication Technology
- A group of technologies that use electronics to store, process and communicate information
- consists of all technical means used to handle information and facilitate communication, including computer and
network hardware, as necessary software
Application of Technology to Media and Information
Referred to as new media technologies
Examples:
Web 2.0
Allow people to interact and collaborate with each other in a social media dialogue as creators of user-generated content
in a virtual community
Electronic Mail
- Commonly called email since around 1993
- A method of exchanging digital messages from an author to one or more recipients that operates across the Internet or
other computer networks
Online Advertising or Internet Advertising
- A form of marketing and advertising which uses the Internet to deliver promotional marketing messages to consumers
Streaming Media
- Video or audio content transmitted in compressed form over the Internet and played immediately, rather than being
saved to the hard drive
Virtual Reality
An immersive multimedia or computer-simulated reality, replicates an environment that simulates q physical presence in
places in the real world or an imagined world, allowing user to interact in that world
Emphatic media
A smart technology that anticipates one’s needs and delivers customized experience
Visual Network
- Allows connecting and photographing life experiences while instantly sharing them with their connected network
Dronevertising
- The use of robotic technology in a variety of industrial application
Cloud Computing
- Internet-based computing where shared resources, data and information are provided to computers and other devices on-
demand
Mobile Computing
- Allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be
connected to a fixed physical link
CH: 2 Evolution of Traditional to New Media (see table of examples from your
book “think, Click & Share”
Traditional media
- encompass the earliest precursors of print from the prehistoric age to the third generation of computers in the Electronic
Age, beginning in 1830 up to 1989 when the World Wide Web was invented by Tim Berners-Lee.
- use a “one-to-many” mode of communicating its contents
“3 different stages of Traditional Media”
Prehistoric Age
Industrial Age
Electronic Age
New media use a “many-to-many” mode of communicating its content. In the wake of digitization brought about by
many devices with computing capacity, people became more interactive. It uses many ways to reach many in the global
arena.
STORYTELLERS
- The storytellers of long ago inspired the creation of Lola Basyang -they are the sources of news and stories about life
Home
- GRANDPARENTS, UNCLES, AUNTS, AND OTHER RELATIVES
- Grandparents or other relatives narrate family or clan stories during their gatherings.
Media Language
- Refer to how the media communicates to the audience.
- The types of languages media uses to communicate to the audience are written, verbal, non-verbal, visual and aural.
Types of Media Languages
1. Written Language – Uses writing system to represent spoken or gestural language.
2. Verbal Language- Uses spoken words to communicate messages.
3. Non-verbal Language- Includes body language, gestures, facial expressions, even posture.
4. Visual Language- Uses visual elements in delivering messages.
5. Aural Language- Uses visual elements in delivering messages.
6. Oral Language- refers to the way language is spoken.
Semiotics
- Study of signs and symbols which covey literal and potential meanings.
Types of Semiotics:
Denotation- the literal meaning of what is physically seen or being heard. It is the translation of a sign to its meaning
more or less like dictionaries try to define words
Connotation- it is the potential or suggested meaning. An idea in addition to its literal meaning.
These are some of the works that are not protected by copyright:
Works that are not be made in a tangible form in a recording or writing
• Concepts or ideas
• Discoveries
• Methods
• Procedures
• Subject matter that is not of original authorship
Netiquette
-Comes from the word “net” (short for Internet) and “etiquette” which refers to the rules on how to behave properly and
politely. Netiquette helps us users determine the do’s and don’ts in the online world and on how to properly behave and
communicate with other users while avoiding flame wars.
Flame wars- Occur when a user posts insulting or hostile comments (called flames) to another user over the Internet.
Flame wars usually happen in forums, message boards, and in discussion place on the internet where different beliefs and
personalities collide. Those who flame others are called trolls.
10 Commandments of Netiquette
1. Do unto others as you’d have others do unto you.
2. Follow the rules that you live in real life.
3. Know where you are online.
4. Respect other people’s time…and bandwidth.
5. Make yourself look good online.
6. Share your knowledge
7. Keep flame wars under control.
8. Respect other people’s privacy.
9. Don’t abuse your power.
10. Be forgiving of other people’s mistakes.
Fair Use - using a copyrighted work for a limited and transformative purpose such as to criticize, to comment upon or to
write a parody of a copyrighted work.
Two Categories of Fair Use:
1. Commentary and Criticism- It allows you to reproduce some of the copyrighted work to achieve your purposes
2. Parody- It is the process of imitating something in a comic way.
Plagiarism is stealing someone else’s work such as thoughts, ideas, expressions and other works that is being
copyrighted.
Forms of Plagiarism:
1. Direct Plagiarism- copying someone’s idea without citing it.
2. Self-Plagiarism- tweaking previous work and submitting to another conference.
3. Mosaic Plagiarism- replacing synonym of other’s work
4. Accidental Plagiarism- paraphrasing someone’s work without giving due credit to the original author
Ways to avoid Plagiarism:
1. Paraphrasing- Make sure that you did not copy more than two words from the text that you have found.
2. Citing- This is one of the most effective ways to avoid plagiarism.
3. Quoting- When quoting from a source, you need use the quote what exactly appears.
4. Referencing- Including a reference page or page of works cited at the end of your research paper is an effective
way in avoiding plagiarism.
Digital Divide-refers to the division to those with or without telephone access that existed way back in the late 20 th
century.
Some Internet Service Providers (ISPs) in the Philippines:
1. Smart Broadband Inc.
2. Globe Telecom
3. Philippine Long Distance Telephone Company(PLDT)
4. Sun Cellular (Digitel Mobile Philippines, Inc. DMPI)
5. Bayan Telecommunications, Inc. (BayanTel)
Internet Addiction- is described as an impulse control disorder that is the excessive use of computer.
Blogging is a contraction of the term “Web log” in which an individual posts commentaries and keeps a regular
chronicle of events.
Cyberbullying is bullying that takes place using electronic technology.
Virtual Self - is how we depict ourselves as we interact with people over the internet.
b. Challenges
On the other hand. The use of social media comes at its own cost. Easier access to private information could led to
several issues including the aforementioned "Identity Theft", pranks and other issues regarding personal information.
The anonymity of the user could also give them a freedom to use other identity for their own advantage.
4. Political
a. Opportunities:
• Provide great amount of information on current political issues.
• Freedom of expression on Internet and users can voice out their opinion about the government.
b. Challenges:
• Using social media as a tool for making a political standpoint on a massive scale will not necessarily guarantee a
favorable outcome.
• Black propaganda
Threats, Risks, Abuse, and Misuse
Privacy
- someone's right to keep their personal matters and relationships secret
- For centuries, we have heard and even witnessed how media have breached a person's right to privacy." According to a
Filipino lawyer (2014), the "right to privacy" is not easily defined. So let's do some reverse engineering and determine
what the "invasions of privacy" are instead.
Invasions of Privacy
There are four types of "invasions of privacy" recognized in Philippine law: appropriation, intrusion, revelation
of private facts, and "false light". Knowing these could help us avoid committing such offenses that could
probably lead to legal punishment.
Appropriation
- This happens when one uses another’s name, likeness, and even voice for commercial or trade purposes without
consent.
Intrusion
- As its name implies, entering another’s property without right or permission (vocabulary.com, 2015). In this case,
intruding on another’s privacy.
The paparazzi are usually the ones who did this kind of violation. Paparazzi refers to unofficial, independent
photographers who take pictures of politicians, entertainers, athletes on their daily life routines.
Revelation of Private Facts
- The unauthorized disclosure of embarrassing personal facts about an individual (Khan, 2014).The person to be accused
of such violation, the fact made public must be offensive to a reasonable person.
False Light
- Occurs when the offender is accused of spreading falsehoods or lies about the victim that would be considered
objectionable by the average person. False light differ from defamation.
Defamation is a law that protect the victim’s reputation. Whereas in false light, there are privacy laws that
protect the victim’s mental or emotional well-being.
Security
-Information is a powerful thing. Organizations invest a lot on information security to protect their secrets. Also, some
businesses even buy information to increase their profits.
Upload - Refers to an act or process of transferring data from one device to another, typically from a smaller to a larger
unit.
Threats to Computer and Internet Security
Virus- This is a malicious program that attaches itself to applications. Just like a biological virus (that is harmful to our
bodies), a computer virus also multiplies or copies itself to propagates, thus, spreading from one computer system to
another.
Worm- Can be injected into a network via USB flash drives or an email attachment. Once the PC is infected, the worm
sends itself to all email addresses it finds.
Trojan- This leaves your PC unprotected and prone to hacking attacks, even though it might appear harmless and
even useful at first.
Spam- Otherwise known as unwanted emails, spam mail may just be an annoyance. But it also can be used to send
different kinds of malicious software (“malware”) like viruses and worms.
Cookies- These are not the Choco-chip flavored ones that you’re thinking of. In computers, cookies are files added to
your computer when you visit a site. Cookies contain information about you (interests, activities, etc.) which actually
make your browsing experience more personalized.
Phishing- Pronounced as “fishing” as it does fish out sensitive information such as passwords and credit card details by
sending official-looking emails asking for these information.
A more sophisticated type of phishing is Pharming, where pharmers create fake website and then collect
information that the users think they are sending to the real website.