Sie sind auf Seite 1von 6

MEDIA AND INFORMATION LITERACY the network.

An electronic communications network


HANDOUT that connects computer networks and organizational
Media and Information Sources computer facilities around the world.
TOPIC OUTLINE:  A global computer network providing a variety
A. Sources of Information of information and communication facilities,
1. Indigenous Knowledge consisting of interconnected networks using
2. Library standardized communication protocols.
3. Internet
EVALUATING INFORMATION FOUND ON THE INTERNET
INDIGENOUS KNOWLEDGE - Indigenous knowledge (IK)  Authorship
is the local knowledge – knowledge that is unique to a  Publishing body
given culture or society. IK contrasts with the  Accuracy and verifiability
international knowledge system generated by  Currency
universities, research institutions and private firms.
(Warren 1991) Media and Information Languages Genre, Codes and
- owned, controlled and managed by indigenous Conventions
peoples in order for them to develop and produce
culturally appropriate information in the languages GENRE - comes from the French word meaning 'type' or
understood by the community by utilizing indigenous 'class‘
materials and resources, reflecting community needs  can be recognized by its common set of
and interests, visions and aspirations, and independent distinguishing features (codes and conventions)
from vested interest groups. (Indigenous Media, What are codes and conventions?
Freedom of Expression and Right to Information: A S E A CODES
N S c e n a r i o, 2014)  are systems of signs, which create meaning
Characteristics CONVENTIONS
• Oral tradition of communication  are the generally accepted ways of doing
• Store information in memories something
• Information exchange is face-to-face
• Information are contain within the border of TYPES OF CODES
the community Technical Codes
 ways in which equipment is used to tell the
LIBRARY - Collection of sources of information and story (camera techniques, framing, depth of
similar resources, made accessible to a defined fields, lighting and exposure, etc.)
community for reference or borrowing. It provides Symbolic Codes
physical or digital access to material, and may be a
 show what is beneath the surface of what we
physical building or room, or a virtual space, or both.
see (objects, setting, body language, clothing,
color, etc. )
TYPES OF LIBRARY
Written Codes
 Academic Library – serves colleges and
 use of language style and textual layout
universities
(headlines, captions, speech bubbles, language
 Public Library – serves cities and towns and all style, etc. )
types
 School Library – serves students from Technical Codes
kindergarten to grade 12 Camera Techniques
 Special Library – are in specialized
environment, such as hospitals, corporations, Basic Camera Advance Camera Angles
museums, the military, private business, and Shots Camera Shots
the government.
Extreme Wide Two Shot Eye-Level
INTERNET - It allows user-to-user communication and Shot Cut Away High Angle
transfer of data files from one computer to another on Wide Shot Low Angle
1
Medium Shot Over the Bird's Eye View
Medium Close- Shoulder Worm’s Eye View
up Point of View Slanted (canted)
Close- up Selective Focus
Extreme Close- Arc Shot
up

Media and Information Languages (Part 2)


I-Video Project
A. Treatment
B. Storyboard

Video Projects
• Digital Storytelling
• Public Service Announcement
• Audio-Visual Presentation
• Parody Video
• Advertisement
• Documentary
• Infomercial
• Music Video
• Short Film
• Vlog

What is a Video Treatment?


Basic Camera Movements
TREATMENT
 consists of a written condensation of a
proposed film or TV dramatic production
 written in the present tense, using active
language and often read like a short story
 covers the basic ideas and issues of the
production as well as the main characters,
locations, and story angles
 covers the full story sequence, typically contains
some key scenes

What is a Storyboard?
 A storyboard is a graphic representation of how
your video will unfold, shot by shot.
 Think of it as sort of a comic book version of
your script.

2
Legal, Ethical, and Societal Issues PHOTOGRAPHIC WORK 50 years from publication
in Media and Information (part 1)
Intellectual property AUDIO- VISUAL WORK 50 years from publication
Fair use and creative commons
50 years from year
What is intellectual property? SOUND RECORDING
recording took place
 refers to creations of the mind, such as
inventions; literary and artistic works; designs; 20 years from date of
and symbols, names and images used in BROADCAST RECORDING
broadcast
commerce
 IP is protected in law by, for Valid for 10 years and may
example, patents, copyright and trademarks, TRADEMARK be renewed for a periods
which enable people to earn recognition or of 10 years
financial benefit from what they invent or
create. By striking the right balance between Valid for 20 years from
the interests of innovators and the wider public INVENTION PATENT
filing date application
interest, the IP system aims to foster an
environment in which creativity and innovation
can flourish. INVENTION
 World Intellectual Property Organization • something that has never been made before, or
(WIPO) is the global forum for intellectual the process of creating something that has
property services, policy, information and never been made before
cooperation • A new device, method, or process developed
 The World Intellectual Property Organization from study and experimentation
(WIPO) is the UN agency responsible for treaties 2. Patent - an exclusive right granted for an invention
involving copyright, patent, and trademark • provides the patent owner with the right to
laws. WIPO can be a force for progressive decide how - or whether - the invention can be
change, helping the world take into account used by others
public interest and development needs. 3. Trademarks - a sign capable of distinguishing the
goods or services of one enterprise from those of other
WHAT ARE THE DIFFERENT TYPES OF enterprises. Trademarks date back to ancient times
INTELLECTUAL PROPERTY? when craftsmen used to put their signature or "mark"
on their products.
1. Copyright - a legal term used to describe the rights • TM means the owner of the mark has common
that creators have over their literary and artistic works law rights even though the mark has not been
 books, music, paintings, sculpture and films, to registered while the ®, on the other hand, is
computer programs, databases, only used for marks that have been granted
advertisements, maps and technical drawings registration.
4. Industrial Design - constitutes the ornamental or
Republic Act 8293 aesthetic aspect of an article
INTELLECTUAL PROPERTY CODE OF THE PHILIPPINES • may consist of three-dimensional features, such
as the shape or surface of an article, or of two-
COPYRIGHT VALIDITY PERIOD dimensional features, such as patterns, lines or
color
During the lifetime of the • An industrial design right protects only the
LITERARY WORKS author plus 50 years after appearance or aesthetic features of a product,
death whereas a patent protects an invention that
offers a new technical solution to a problem. In
25 years from the date of principle, an industrial design right does not
ART
creation protect the technical or functional features of a
product. Such features could, however,
3
potentially be protected by a patent. Find out other method, practice the Golden Rule: Do unto others
more about patents. as you would have others do unto you.
5. Geographical Indications and Appellations of Origin
• signs used on goods that have a specific Rule 2: Adhere to the same standards of behavior
geographical origin and possess qualities, a online that you follow in real life
reputation or characteristics that are essentially While it can be argued that standards of behavior may
attributable to that place of origin be different in the virtual world, they certainly should
• most commonly includes the name of the place not be lower. You should do your best to act within the
of origin of the goods. laws and ethical manners of society whenever you
inhabit "cyberspace." Would you behave rudely to
Legal, Ethical, and Societal Issues someone face-to-face? On most occasions, no. Neither
in Media and Information (Part 2) should you behave this way in the virtual world.
Digital Citizenship, Netiquette, Digital Footprints
and Digital Issues in the Philippines Rule 3: Know where you are in cyberspace
"Netiquette varies from domain to domain." (Shea,
What is Digital citizenship? 1994) Depending on where you are in the virtual world,
 is the norms of appropriate, responsible the same written communication can be acceptable in
technology use one area, where it might be considered inappropriate in
 holistic and positive approach to helping another. What you text to a friend may not be
children learn how to be safe and secure, as appropriate in an email to a classmate or colleague.
well as smart and effective participants in a
digital world Rule 4: Respect other people's time and bandwidth
Electronic communication takes time: time to read and
Key Principles with Elements Of Digital Citizenship time in which to respond. Most people today lead busy
lives, just like you do, and don't have time to read or
Respect Yourself/ Educate Yourself/ Educate Yourself/ respond to frivolous emails or discussion posts. As a
Respect Others Connect with Connect with virtual world communicator, it is your responsibility to
Others Others make sure that the time spent reading your words isn't
wasted. Make your written communication meaningful
Digital Etiquette Digital Literacy Digital Rights and and to the point, without extraneous text or
Responsibility superfluous graphics or attachments that may take
forever to download.
Digital Access Digital Digital Safety
Communication (Security)
Rule 5: Make yourself look good online
Digital Law Digital Commerce Digital Health and One of the best things about the virtual world is the lack
Welfare of judgment associated with your physical appearance,
sound of your voice, or the clothes you wear (unless you
post a video of yourself singing Karaoke in a clown
What is Netiquette? outfit.) You will, however, be judged by the quality of
• The word netiquette is a combination of ’net’ your writing, so keep the following tips in mind:
(from internet) and ’etiquette’. • Always check for spelling and grammar errors
• set of rules for behaving properly online • Know what you're talking about and state it
• respecting other users’ views and displaying clearly
common courtesy when posting your views to • Be pleasant and polite
online discussion groups
Rule 6: Share expert knowledge
The Core Rules of Netiquette The Internet offers its users many benefits; one is the
Rule 1: Remember the Human ease in which information can be shared or accessed
When communicating electronically, whether through and in fact, this "information sharing" capability is one
email, instant message, discussion post, text, or some of the reasons the Internet was founded. So in the spirit
of the Internet's "founding fathers," share what you

4
know! When you post a question and receive intelligent websites you visit, emails you send, and
answers, share the results with others. information you submit to online services.
 A passive digital footprint is created when data
Rule 7: Help keep flame wars under control is collected without the owner knowing,
What is meant by "flaming" and "flame wars?" "Flaming whereas active digital footprints are created
is what people do when they express a strongly held when personal data is released deliberately by a
opinion without holding back any emotion." (Shea, user for the purpose of sharing information
1994). As an example, think of the kinds of passionate about oneself by means of websites or social
comments you might read on a sports blog. While media.
"flaming" is not necessarily forbidden in virtual
communication, "flame wars," when two or three Legal, Ethical, and Societal Issues in
people exchange angry posts between one another, Media and Information (Part 3)
must be controlled or the camaraderie of the group
could be compromised. Don't feed the flames; Plagiarism - the act of using another person's words or ideas
without giving credit to that person
extinguish them by guiding the discussion back to a
 The practice of taking someone else's work or ideas
more productive direction.
and passing them off as one's own.

Rule 8: Respect other people's privacy TYPES OF PLAGIARISM


Depending on what you are reading in the virtual world,
be it an online class discussion forum, Facebook page, Sources Not Cited Sources Cited
or an email, you may be exposed to some private or
personal information that needs to be handled with The Ghost Writer The Forgotten Footnote
care. Perhaps someone is sharing some medical news
about a loved one or discussing a situation at work. The Photocopy Misinformer

Rule 9: Don't abuse your power The Potluck Paper The Too-perfect Paraphrase
Just like in face-to-face situations, there are people in
cyberspace who have more "power" than others. They
The Poor Disguise The Resourceful Citer
have more expertise in technology or they have years of
experience in a particular skill or subject matter. Maybe The Labor of Laziness The Perfect crime
it's you who possesses all of this knowledge and power!
Just remember: knowing more than others do or having The Self-stealer
more power than others may have does not give you
the right to take advantage of anyone. Think of Rule 1:
Remember the human. TYPES OF PLAGIARISM:
SOURCES NOT CITED
Rule 10: Be forgiving of other people's mistakes 1. The Ghost Writer
Not everyone has the same amount of experience  The writer turns in another’s work, word-for-word,
as his or her own.
working in the virtual world. And not everyone knows
2. The Photocopy
the rules of netiquette. At some point, you will see a  The writer copies significant portions of text straight
stupid question, read an unnecessarily long response, or from a single source, without alteration.
encounter misspelled words; when this happens, 3. The Potluck Paper
practice kindness and forgiveness as you would hope  The writer copies from several different sources,
someone would do if you had committed the same tweaking the sentences to make them fit together
offense. If it's a minor "offense," you might want to let while retaining most of the original phrasing.
it slide. If you feel compelled to respond to a mistake, 4. The Poor Disguise
do so in a private email rather than a public forum.  The writer has altered the paper’s appearance
slightly by changing key words and phrases.
5. The Labor of Laziness
Digital Footprint
 The writer takes the time to paraphrase most of the
 A digital footprint is a trail of data you create paper from other sources and make it all fit
while using the Internet. In includes the together.
5
6. The Self-Stealer - Re-mixing or altering copyrighted images, video or audio,
 The writer “borrows” generously from his or her even if done so in an original way. The legality of these
previous work. situations, and others, would be dependent upon the intent
and context within which they are produced.
TYPES OF PLAGIARISM:
SOURCES CITED (BUT STILL PLAGIARIZED) The two safest approaches to take in regards to these
1. The Forgotten Footnote situations is:
 The writer mentions an author’s name for a source, 1) Avoid them altogether or;
but neglects to include specific information on the 2) Confirm the works’ usage permissions and cite them
location of the material referenced. properly.

2. The Misinformer
 The writer provides inaccurate information regarding Why does plagiarism matters?
the sources, making it impossible to find them. • Plagiarism is a breach of academic integrity. It is a
3. The Too-Perfect Paraphrase principle of intellectual honesty that all members of
 The writer properly cites a source, but neglects to the academic community should acknowledge their
put in quotation marks on text that has been copied debt to the originators of the ideas, words, and data
word-for-word, or close to it. which form the basis for their own work. Passing off
4. The Resourceful Citer another’s work as your own is not only poor
 The writer properly cites all sources, paraphrasing scholarship, but also means that you have failed to
and using quotations appropriately. complete the learning process. Plagiarism is
5. The Perfect Crime unethical and can have serious consequences for
 The writer properly quotes and cites sources in some your future career; it also undermines the standards
places, but goes on to paraphrase other arguments of your institution and of the degrees it issues.
from those sources without citation.

WHAT ABOUT IMAGES, VIDEOS, AND MUSIC?


- Using an image, video or piece of music in a work you have
produced without receiving proper permission or providing
appropriate citation is plagiarism. The following activities are
very common in today’s society. Despite their popularity,
they still count as plagiarism.
- Copying media (especially images) from other websites to
paste them into your own papers or websites.
- Making a video using footage from others’ videos or using
copyrighted music as part of the soundtrack.
 Performing another person’s copyrighted music (i.e.,
playing a cover).
 Composing a piece of music that borrows heavily
from another composition.
 Certainly, these media pose situations in which it can
be challenging to determine whether or not the
copyrights of a work are being violated.

For example:
- A photograph or scan of a copyrighted image (for example:
using a photograph of a book cover to represent that book on
one’s website)
- Recording audio or video in which copyrighted music or
video is playing in the background.
- Re-creating a visual work in the same medium. (for example:
shooting a photograph that uses the same composition and
subject matter as someone else’s photograph)
- Re-creating a visual work in a different medium (for
example: making a painting that closely resembles another
person’s photograph).

Das könnte Ihnen auch gefallen