Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading content…
Loading…
Transcript

Lesson 7

Legal, Ethical, and Societal Issues in Media and

Information

https://www.slideshare.net/markjhonoxillo/legal-ethical-and-societal-issues-in-media-and-information

Learning Objectives

  • At the end of the lesson, the learners discuss and analyze a specific case study related to legal, ethical, and societal issues in the use of media and information literacy

Introduction

Republic Act No. 10175

Republic Act No.10175

  • Or the Cybercrime Prevention Act of 2012
  • is a law in the Philippines approved on September 12, 2012 which aims to address legal issues concerning online interactions and the Internet
  • Among the cybercrime offenses included in the bill are cybersquatting,cybersex, child pornography, identity theft, illegal access to data and libel.

Cyber

So what is Cyber?

CYBER means relating to, or involving computers or computer networks (such as the Internet)

Cyberspace

This refers to the virtual computer world, and more specifically, is an electronic medium used to form a global computer network to facilitate online. communication

Cybercrime

This refers to the criminal activities carried out by means of computers or the Internet

Cyberbullying

It is the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature

Hacking

It refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator's original objective. Those individuals who engage in computer hacking activities are typically referred to as “hackers”.

Phishing

It is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

Illegal Downloading

It refers to obtaining files that you do not have the right to use from the Internet.

Digital Piracy

It is the practice of illegally copying and selling digital music, video, computer software, etc.

Identity Theft

It is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss

Cyber Defamation

It is an unprivileged false statement of fact which tends to harm the reputation of a person or company

2 Types of Defamation:

1. Libel - written

2. Slander - verbal

Cybersex

It also called computer sex, Internet sex, netsex.

it is a virtual sex encounter in which two or more people (connected remotely via internet) send each other sexually explicit contents or sexually explicit acts.

Child Pornography

It is a form of child sexual exploitation

Cybersquatting

It is registering, trafficking in, or using an Internet domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. The cybersquatter then offers to sell the domain to the person or company who owns a trademark contained within the name at an inflated price.

Copyright

It is a legal device that gives the creator of a literary, artistic, musical, or other creative work the sole right to publish and sell that work. Copyright owners have the right to control the reproduction of their work, including the right to receive payment for that reproduction. Violation of a copyright is called infringement.

Fair Use

It is a legal concept that allows the reproduction of copyrighted material for certain purposes without obtaining permission and without paying a fee. Purposes permitting the application of fair use generally include review, news reporting, teaching, or scholarly research.

Plagiarism

It is an act or instance of using or closely imitating the language and thoughts of another author without authorization; the representation of that author's work as one's own, as by not crediting the original author

Computer Addiction

the excessive use of computers to the extent that it interferes with daily life. This excessive use may for example interfere with work or sleep, result in problems with social interaction, or affect mood, relationships and thought processes.

Digital Divide

an economic inequality between groups in terms of access to, use of, or knowledge of ICT. The divide within countries can refer to inequalities between individuals, households, businesses, and geographic areas at different socioeconomic (and other demographic) levels

Virtual Self

The persona you create about yourself virtually

Netiquette

It is the correct or acceptable way of communicating on the Internet.

Information Security

Data Privacy

Intellectual Property

Social Media

Examples

Question 1:

Question 1:

Question 2:

Question 2:

Question 2:

  • When working outside of a company office, take extra care to ensure you are working securely.
  • Guard work materials and the view of your laptop or phone by using a privacy screen. Always maintain control over your devices and documents and never leave them unattended.
  • If you step away from your workspace, use a lock for your laptop and take everything else with you.
  • Never rely on someone else to guard your belongings even for a brief moment.

Question 3:

Question 3:

Question 4:

Question 4:

Question 4:

Question 5:

Question 5:

Question 5:

Question 6:

Question 6:

Question 6:

Question 7:

Question 7:

Question 7:

Question 7:

Question 7:

Question 8:

Question 8:

Question 8:

Question 7:

Learn more about creating dynamic, engaging presentations with Prezi