0% found this document useful (0 votes)
17 views8 pages

Mil Handouts

Uploaded by

PJ MJ
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views8 pages

Mil Handouts

Uploaded by

PJ MJ
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

CH: 1 INTRODUCTION TO MEDIA AND INFORMATION LITERACY

Media
Refers to any information and communication tool
Affect the way we get information
Media Literacy
Ability to read, analyze, evaluate and produce communication in a variety of media forms
Media and Information Literacy
Essential competencies and skill that allow citizens to engage with media and other information providers
Develop critical thinking and life-long learning skills
Media and its Sources:
1. Primary Sources 2. Secondary Sources
– Original materials – Interpretations and evaluations of the primary source
– These sources are unfiltered and unevaluated – Usually contain the “benefit of hindsight”
3. Tertiary Sources
– Information that are already a collection of primary and secondary sources
– can already be filtered and/or evaluated
Multiple Roles of Media
1. Informative Role 2. Educative Role
– media is the source of information – media assists in the understanding
– enables everyone to be an “informed citizen” and comprehension of information
3. Platform Role
– Media is used by different groups, organizations or institutions as a kind of voice
– Media is used as a “platform” where their side of the story is heard
4. Entertainment Role
– Media is used to entertain people
5. Other Roles:
- Adversarial Role – media is used as a “watch dog” for an institution
- Advocacy Role – media became a place where ideas are heard, broadcast or promoted
Information Literacy
A set of abilities requiring individuals to “recognize when information is needed and have the ability to locate, evaluate,
and use effectively the needed information.”
Technology Literacy
Essential 21st century skill
- ability to responsibly use appropriate technology to communicate, solve problems and access, manage, integrate,
evaluate, and create information to improve learning in all subject areas and to acquire lifelong knowledge and skills
- Maybe known as tool literacy
- Ability to use digital technology, communication tools or networks to locate, evaluate, use and create information
- Ability to understand and use information in multiple formats from a wide range of sources when it is presented via
computers and to a person’s ability to perform tasks effectively in a digital environment
Digital Native
- One who is born into the digital age arbitrarily, applied to children after 1980
Digital Immigrant
- One who adopts technology later in life
Information and Communication Technology
- A group of technologies that use electronics to store, process and communicate information
- consists of all technical means used to handle information and facilitate communication, including computer and
network hardware, as necessary software
Application of Technology to Media and Information
Referred to as new media technologies
Examples:
Web 2.0
Allow people to interact and collaborate with each other in a social media dialogue as creators of user-generated content
in a virtual community
Electronic Mail
- Commonly called email since around 1993
- A method of exchanging digital messages from an author to one or more recipients that operates across the Internet or
other computer networks
Online Advertising or Internet Advertising
- A form of marketing and advertising which uses the Internet to deliver promotional marketing messages to consumers
Streaming Media
- Video or audio content transmitted in compressed form over the Internet and played immediately, rather than being
saved to the hard drive

Virtual Reality
An immersive multimedia or computer-simulated reality, replicates an environment that simulates q physical presence in
places in the real world or an imagined world, allowing user to interact in that world
Emphatic media
A smart technology that anticipates one’s needs and delivers customized experience
Visual Network
- Allows connecting and photographing life experiences while instantly sharing them with their connected network
Dronevertising
- The use of robotic technology in a variety of industrial application
Cloud Computing
- Internet-based computing where shared resources, data and information are provided to computers and other devices on-
demand
Mobile Computing
- Allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be
connected to a fixed physical link

CH: 2 Evolution of Traditional to New Media (see table of examples from your
book “think, Click & Share”
Traditional media
- encompass the earliest precursors of print from the prehistoric age to the third generation of computers in the Electronic
Age, beginning in 1830 up to 1989 when the World Wide Web was invented by Tim Berners-Lee.
- use a “one-to-many” mode of communicating its contents
“3 different stages of Traditional Media”
Prehistoric Age
Industrial Age
Electronic Age

New media use a “many-to-many” mode of communicating its content. In the wake of digitization brought about by
many devices with computing capacity, people became more interactive. It uses many ways to reach many in the global
arena.

CH: 3 Information Literacy


The Association of College and Research Libraries (ACRL), a division of the American Library Association has defined
what an information literate individual is able to do on the basis of a set standards with performance indicators.
There are 6 branches of Information Literacy:
• Task Definition (TD)
• Information Seeking Strategies (ISS)
• Locate and Access (L&A)
• Use of Information (UI)
• Synthesis (S)
• Evaluation (E)
ACRL:The information literate student Big6 Skills
1.determines the nature and extent of the information 1.Task Definition (TD)
needed 1.1 Define the problem
1.2 Identify the information needed.
2. accesses needed information effectively and 2.Information Seeking Strategies(ISS)
efficiently 2.1 Determine all possible sources.
2.2 Select the best source.
3. evaluate information and its sources critically and 3. Locate & Access (L&A)
incorporates selected information into his or her 3.1 Locate sources
knowledge base and value system 3.2 Find information within sources
4. individually or as a member of a group, uses 4. Use of Information (UI)
information effectively to accomplish a specific 4.1 Engage(e.g.read,hear,view)
purpose 4.2 Extract relevant information

5.understand many of the economic,legal,and social 5. Synthesis (S)


issues surrounding the use of information accesses and 5.1 Organize information from multiple source.
uses information ethically and legally 5.2 Present the result
6.Evaluation (E)
6.1 Judge the result(effectiveness).
6.2 Judge the process(efficiency).

CH: 4 Types of Media


MEDIA - is a way to carry out a message from one person to another and the various ways to which we can communicate
to the society.
Print media
-used to describe the traditional or “old-fashioned” print-based media.
-Refers to media consisting of paper and ink – reproduces in a printing process that is traditionally mechanical.
Books
- A set of written, printed, illustrated, or blank sheets, made of ink, paper, parchment, or other materials, fastened together
to hinge at one side.
Journals
- A peer-reviews or refereed periodical which scholarship relating to a particular academic discipline is published.
Other Printed Materials
- Specifically developed to convey an advertiser’s message to targeted customers.
Newspaper
- Are regularly scheduled publications containing news, information and advertising.
- Are printed daily or weekly. They are common source of local, regional or national news.
Magazine
- Are periodical publications containing articles illustrations or advertisements that usually cover a particular area of
interest.
Billboards
- Are large outdoor boards that commonly display advertisements.
Flyers
- Are small bulletin advertisements of events, products, or services.
Broadcast media
-are news reports aired via radio and television.
- Generally is disseminating audio or visual programs to a large number of radio or television receivers.
Radio
- A communication of audible signals encoded in electromagnetic waves transmission of programs for the public by radio
broadcast.
- A system that uses sound formats to transmit audio texts for informational educational, entertainment, or commercial
purposes.
Television
- Is transmission of dynamic or sometimes static images, generally with accompanying sound, via electromagnetic signals
- A system that uses video formats to broadcast informational, entertaining, educational, or commercial shows.
Film
- A form of entertainment that enacts a story by a sequence of images and sound, giving the illusion of continuous
movement
- Films or movies are the oldest forms of motion picture technology capable of capturing lifelike video-style images.
New Media
-refers to content organized and distributed on digital platforms.
Accessibility
- A content that is easily accessible via many different forms of digital media.
Internet
- It commonly refers to content available on demand through the Internet, accessible in any digital device.
Ex:
- Online newspapers - Video games
- Blogs - Social Media
- Wikis
Media Convergence
- refers to the ability to transform different kinds of media into digital code, which is then accessible by a range of devices
from the personal computer to the mobile phone, thus creating a digital communication environment.

CH 5: Media and Information Sources


Indigenous media and information sources
- There are persons who are assigned by the inheritance or talent the memory of the people. One may have stories or facts
of the past, another may be a repository of ditties and songs.
Griot
- One such person traced an event that led to the capture of his ancestor that became slave in America. That person is
called griot who through memory maintains an oral record of the history of his tribe in Western America.
Herbolario
- possesses information and knowledge of plants and their medicinal properties. Due to the number of persons he/she has
healed, he/she may be considered reliable and authoritative information source on medicinal plants.

STORYTELLERS
- The storytellers of long ago inspired the creation of Lola Basyang -they are the sources of news and stories about life
Home
- GRANDPARENTS, UNCLES, AUNTS, AND OTHER RELATIVES
- Grandparents or other relatives narrate family or clan stories during their gatherings.

MEDIA and INFORMATION SOURCES in the LIBRARY


- these categories are based on their originality and proximity to the origin source. The dissemination of these information
moves through cycle.
PRIMARY SOURCES
 Present original thinking in a report on discoveries or new information.
 Usually the first formal publication of results in print or electronic literature.
 Original form; devoid of interpretation, evaluation, or condensation by other writers.
 A record of what happened
EXAMPLES
• Scientific journal articles reporting experimental research results
• Proceedings of meetings, conferences and symposia
• Technical reports
• Dissertations or theses (may also be secondary)
• Patents of inventions
• Sets of data, such as census statistics
• Works of literature (poems and fiction)
• Original documents (such as birth certificate or trial transcripts)
SECONDARY SOURCES
 Interpret and evaluate primary sources through description, comments, and analysis of content
 Created later by someone who did not experience first-hand or participate in the event
What some define as primary source,
Others may define as secondary & vice versa.
EXAMPLES
• Bibliographies (may also be tertiary)
• Biographical works
• Commentaries
• Dictionaries & encyclopedias (may also be tertiary)
• Dissertations or theses (more usually primary)
• Handbooks & data compilations (may also be tertiary)
• History
TERTIARY SOURCES
 Information & content come from secondary sources
 The author present the contents in a convenient, easy-to-read format
EXAMPLES
• Almanacs and fact books
• Bibliographies ( may also be secondary)
• Chronologies
• Dictionaries & encyclopedias ( may also be secondary)
• Directories
• Guidebooks, manuals, catalogs, OPACs
MEDIA AND INFORMATION SOURCES IN THE INTERNET
- The internet has all these; it is both media as it has the information technology infrastructure and information source as it
has web sites, specialized journals and magazines, e-books, films & movies, videos, games and what business companies
& corporations provide.
OTHER MEDIA AND INFORMATION SOURCES
-users must examine media and information sources for independence, accountability, timeliness and relevance, balance
of privacy and the right to know, and the provision of a forum for public criticism and problem-solving.
• Museums
• Media companies
• Government monopolies
• Non-government organizations (NGOs)
• Religious groups
• Political parties
• Business entities and many more

CH 6: Media and Information Languages


- refer to the way of constructing meaning in media texts to communicate ideas and impression for an audience.
Signs - A system of signs put together (usually in sequence) to create meaning.
Codes- a system of signs put together to create meaning
Conventions- The accepted ways in doing things or habits acquired through repeated experiences for familiarity.

DIFFERENT TYPES OF CODES


Technical Codes
- refers to those related to layout, framing and rendering of the image
- It also includes camera angles, sound and lighting.
Symbolic Codes
- refers to the colors, objects, body language, clothing and setting.
- We decode the symbols that would carry a certain number of connotations.
- It also includes mise-en-scene, the language, dress and actions of characters.
Written Codes
- refers to the case of letters, font, headlines, captions, speech bubbles, language style
Narrative Codes
- refers to the story being told through the picture

Media Language
- Refer to how the media communicates to the audience.
- The types of languages media uses to communicate to the audience are written, verbal, non-verbal, visual and aural.
Types of Media Languages
1. Written Language – Uses writing system to represent spoken or gestural language.
2. Verbal Language- Uses spoken words to communicate messages.
3. Non-verbal Language- Includes body language, gestures, facial expressions, even posture.
4. Visual Language- Uses visual elements in delivering messages.
5. Aural Language- Uses visual elements in delivering messages.
6. Oral Language- refers to the way language is spoken.

Semiotics
- Study of signs and symbols which covey literal and potential meanings.
Types of Semiotics:
Denotation- the literal meaning of what is physically seen or being heard. It is the translation of a sign to its meaning
more or less like dictionaries try to define words
Connotation- it is the potential or suggested meaning. An idea in addition to its literal meaning.

Audience, producers AND other stakeholders


Audience- Most important component in field of media and information languages. The group of consumers for whom a
media text was constructed as well as anyone else who is exposed to the text.
Target Audience- Group of readers, viewers or listeners to whom a media text is specifically addressed because of the set
of characteristics that they share such as age, gender, profession, class and interests.
Active Audience- Based on reception theory. Audiences are seen as active participants in reading and interpreting media
and information texts.
Producers or stakeholders
- Provide the products and services needed by the audience.
- Are concerned simply on a few demographics profile such as age, gender, and occupation.

CH 7: Legal, Ethical, and Societal Issues in Media and Information


Copyright- Is a legal right that protects the original work of an author to have an exclusive right to reproduce and

distribute. It enables the author to control the commercialization of his work.


These are some of the works that will be protected by copyright:

-LITERARY WORKS -Dramatic Works - Television and Radio Broadcasts


-Musical Works -Artistic Works
-Sound Recordings -Films

These are some of the works that are not protected by copyright:
Works that are not be made in a tangible form in a recording or writing
• Concepts or ideas
• Discoveries
• Methods
• Procedures
• Subject matter that is not of original authorship
Netiquette
-Comes from the word “net” (short for Internet) and “etiquette” which refers to the rules on how to behave properly and
politely. Netiquette helps us users determine the do’s and don’ts in the online world and on how to properly behave and
communicate with other users while avoiding flame wars.
Flame wars- Occur when a user posts insulting or hostile comments (called flames) to another user over the Internet.
Flame wars usually happen in forums, message boards, and in discussion place on the internet where different beliefs and
personalities collide. Those who flame others are called trolls.
10 Commandments of Netiquette
1. Do unto others as you’d have others do unto you.
2. Follow the rules that you live in real life.
3. Know where you are online.
4. Respect other people’s time…and bandwidth.
5. Make yourself look good online.
6. Share your knowledge
7. Keep flame wars under control.
8. Respect other people’s privacy.
9. Don’t abuse your power.
10. Be forgiving of other people’s mistakes.
Fair Use - using a copyrighted work for a limited and transformative purpose such as to criticize, to comment upon or to
write a parody of a copyrighted work.
Two Categories of Fair Use:
1. Commentary and Criticism- It allows you to reproduce some of the copyrighted work to achieve your purposes
2. Parody- It is the process of imitating something in a comic way.
Plagiarism is stealing someone else’s work such as thoughts, ideas, expressions and other works that is being
copyrighted.
Forms of Plagiarism:
1. Direct Plagiarism- copying someone’s idea without citing it.
2. Self-Plagiarism- tweaking previous work and submitting to another conference.
3. Mosaic Plagiarism- replacing synonym of other’s work
4. Accidental Plagiarism- paraphrasing someone’s work without giving due credit to the original author
Ways to avoid Plagiarism:
1. Paraphrasing- Make sure that you did not copy more than two words from the text that you have found.
2. Citing- This is one of the most effective ways to avoid plagiarism.
3. Quoting- When quoting from a source, you need use the quote what exactly appears.
4. Referencing- Including a reference page or page of works cited at the end of your research paper is an effective
way in avoiding plagiarism.
Digital Divide-refers to the division to those with or without telephone access that existed way back in the late 20 th
century.
Some Internet Service Providers (ISPs) in the Philippines:
1. Smart Broadband Inc.
2. Globe Telecom
3. Philippine Long Distance Telephone Company(PLDT)
4. Sun Cellular (Digitel Mobile Philippines, Inc. DMPI)
5. Bayan Telecommunications, Inc. (BayanTel)
Internet Addiction- is described as an impulse control disorder that is the excessive use of computer.
Blogging is a contraction of the term “Web log” in which an individual posts commentaries and keeps a regular
chronicle of events.
Cyberbullying is bullying that takes place using electronic technology.
Virtual Self - is how we depict ourselves as we interact with people over the internet.

CH 8: Opportunities and Challenges of Media and Information


Lesson 1: Opportunities and Challenges of Media and Information in the Economic, Educational, Social, and Political
(4) Aspects of Our Society
1. Education
a. Opportunities
-In today's time. We have revolutionized the ways that we deal with education. Information has never been faster than
ever before. We could learn from our computer screens. This was made possible through E-Learning. We could graduate
and attain degree just by sitting in front of the computer. The internet has become the largest library of information made
by mankind. Social media also provides learners the chance to meet peoples who is expert at their chosen field.
b. Challenges
-In every ups, there's down. E-learning is one of the prominent example of this phenomenon. The lack of physical activity
will lead to boredom and health issues.
-Miscommunication is risks are also present when using E-Learning as an education tool.
2. Economic
a. Opportunities
- before the 21st century, business transaction were performed face to face, sometime through a telephone. Nowadays, by
the use of the internet, it will make your work easier especially for those businessman, because of the online transactions,
expanded arenas of their businesses.
The process of business activities has been improved by the internet since then. The emergence of eBay gives the
opportunities of having business even without the face-to-face interaction. E-commerce paves a way to inquire to
consumers and producers alike. It comes in three forms:
1. B2C (business-to-consumer)
2. C2C (consumer-to-consumer)
3. B2B (business-to-business)
Mobile commerce or M-commerce is also a variation of e-commerce. On May 2014, Google announced that the websites
that are mobile responsive shall be the topmost search. This pushes the business with ties on the online realm to follow
this kind of business model.
b. Challenges
Identity Theft is one of the issues regarding e-commerce. According to the U.S. Federal Trade Commission (FTC)
Identity Theft occurs when "someone uses your personally identifying information, these includes, name, Social Security
Number, or credit card number." By this people could exploit your resources (cash) through your personal information.
3. Social
a. Opportunities
- Connecting individuals of different country and of different generations.
- Offers Support System.

b. Challenges
On the other hand. The use of social media comes at its own cost. Easier access to private information could led to
several issues including the aforementioned "Identity Theft", pranks and other issues regarding personal information.
The anonymity of the user could also give them a freedom to use other identity for their own advantage.
4. Political
a. Opportunities:
• Provide great amount of information on current political issues.
• Freedom of expression on Internet and users can voice out their opinion about the government.
b. Challenges:
• Using social media as a tool for making a political standpoint on a massive scale will not necessarily guarantee a
favorable outcome.
• Black propaganda
Threats, Risks, Abuse, and Misuse
Privacy
- someone's right to keep their personal matters and relationships secret
- For centuries, we have heard and even witnessed how media have breached a person's right to privacy." According to a
Filipino lawyer (2014), the "right to privacy" is not easily defined. So let's do some reverse engineering and determine
what the "invasions of privacy" are instead.

Invasions of Privacy
 There are four types of "invasions of privacy" recognized in Philippine law: appropriation, intrusion, revelation
of private facts, and "false light". Knowing these could help us avoid committing such offenses that could
probably lead to legal punishment.
Appropriation
- This happens when one uses another’s name, likeness, and even voice for commercial or trade purposes without
consent.
Intrusion
- As its name implies, entering another’s property without right or permission (vocabulary.com, 2015). In this case,
intruding on another’s privacy.
The paparazzi are usually the ones who did this kind of violation. Paparazzi refers to unofficial, independent
photographers who take pictures of politicians, entertainers, athletes on their daily life routines.
Revelation of Private Facts
- The unauthorized disclosure of embarrassing personal facts about an individual (Khan, 2014).The person to be accused
of such violation, the fact made public must be offensive to a reasonable person.
False Light
- Occurs when the offender is accused of spreading falsehoods or lies about the victim that would be considered
objectionable by the average person. False light differ from defamation.
Defamation is a law that protect the victim’s reputation. Whereas in false light, there are privacy laws that
protect the victim’s mental or emotional well-being.
Security
-Information is a powerful thing. Organizations invest a lot on information security to protect their secrets. Also, some
businesses even buy information to increase their profits.
Upload - Refers to an act or process of transferring data from one device to another, typically from a smaller to a larger
unit.
Threats to Computer and Internet Security
Virus- This is a malicious program that attaches itself to applications. Just like a biological virus (that is harmful to our
bodies), a computer virus also multiplies or copies itself to propagates, thus, spreading from one computer system to
another.
Worm- Can be injected into a network via USB flash drives or an email attachment. Once the PC is infected, the worm
sends itself to all email addresses it finds.
Trojan- This leaves your PC unprotected and prone to hacking attacks, even though it might appear harmless and
even useful at first.
Spam- Otherwise known as unwanted emails, spam mail may just be an annoyance. But it also can be used to send
different kinds of malicious software (“malware”) like viruses and worms.
Cookies- These are not the Choco-chip flavored ones that you’re thinking of. In computers, cookies are files added to
your computer when you visit a site. Cookies contain information about you (interests, activities, etc.) which actually
make your browsing experience more personalized.
Phishing- Pronounced as “fishing” as it does fish out sensitive information such as passwords and credit card details by
sending official-looking emails asking for these information.
A more sophisticated type of phishing is Pharming, where pharmers create fake website and then collect
information that the users think they are sending to the real website.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy