Media and Information Evolution of Media Personal computers -
Literacy i.e. Hewlett- Packard
Pre-Industrial Age (Before 1700s) 9100A (1968), Apple 1 Literacy: People discovered fire, (1976) OHP, LCD The ability to identify, developed paper from plants, projectors understand, interpret, create, and forged weapons and tools Information Age (1900s-2000s) communicate and compute, with stone, bronze, copper and The Internet paved the way for using printed and written iron. faster communication and the materials associated with Examples: creation of the social network. varying contexts. Cave paintings (35,000 People advanced the use of Media: BC) microelectronics with the The physical objects used to Clay tablets in invention of personal computers, communicate with, or the mass Mesopotamia (2400 mobile devices, and wearable communication through physical BC) technology. Moreover, voice, objects (radio, television, Papyrus in Egypt image, sound and data are computers, film, etc). (2500 BC) digitalized. We are now living in It also refers to any physical Acta Diurna in Rome the information age. object used to communicate (130 BC) Examples: messages. Dibao in China (2nd Web browsers: Mosaic Source of credible information Century) • Codex in (1993), Internet (contents are provided through the Mayan region Explorer (1995) an editorial process determined (5th Century) Blogs: Blogspot by journalistic values and where Printing press using (1999), LiveJournal editorial accountability can be wood blocks (220 AD) (1999), Wordpress attributed to an organization or a Industrial Age (1700s-1930s) (2003) legal person). People used the power of steam, Social networks: developed machine tools, Friendster (2002), In more recent years the term Multiply (2003), ‘media’ is often used to include established iron production, and the manufacturing of various Facebook (2004) new online media. products (including books Microblogs: Twitter Media Literacy: through the printing press). (2006), Tumblr (2007) The ability to access, analyze, Examples: Video: YouTube evaluate, and create media in a Printing press for mass (2005) variety of forms. production (19th Augmented Reality / It aims to empower citizens by century) Virtual Reality providing them with the Newspaper- The Video chat: Skype competencies (knowledge and London Gazette (1640) (2003), Google skills) necessary to engage with Typewriter Hangouts (2013) traditional media and new (1800)Telephone Search Engines: technologies. (1876) Google (1996), Yahoo Information: Motion picture (1995) A broad term that covers photography/projectio Portable computers- processed data, knowledge n(1890) laptops (1980), derived from study, experience, Commercial motion netbooks (2008), instruction, signals or symbols. pictures (1913) tablets (1993) Information Literacy: Motion picture with Smart phones The ability to recognize when sound (1926) Wearable technology information is needed, and to Telegraph Cloud and Big Data locate, evaluate, and effectively Punch cards communicate information in its Electronic Age (1930s-1980s) Stages of Information various formats. The invention of the transistor Technology Literacy: ushered in the electronic age. 1. Identifying/recognizing The ability of an individual, to People harnessed the power of information needs. (Why do you responsibly, appropriately, and transistors that led to the need information?) effectively use technological transistor radio, electronic 2. Determining sources of tools. (Using these tools an circuits, and the early computers. information. (Where do you individual can access, manage, In this age, long distance search for information?) integrate, evaluate, create and communication became more 3. Citing or searching for communicate information.) efficient. information. (How do you Media and Information Literacy: Examples: acquire and store information?) The essential skills and Transistor Radio 4. Analyzing and evaluating the competencies that allow Television (1941) quality of information. (How will individuals to engage with media Large electronic you determine the quality and and other information providers computers- i.e. accuracy of the information that effectively (as well as develop EDSAC (1949) and you have?) critical thinking and life-long UNIVAC 1 (1951) 5. Organizing, storing or archiving learning skills to socialize and Mainframe computers information. (How do you use become active citizens). - i.e. IBM 704 (1960) the information that you have?) 6. Using information in an ethical, evaluated. Others refer to the efficient and effective way. trustworthiness of the source in Language (How will you communicate evaluating the reliability of Pertains to the technical and information?) information. symbolic ingredients or codes 7. Creating and communicating Accuracy of information and conventions that media and new knowledge. Accuracy refers to the closeness information professionals may of the report to the actual data. select and use in an effort to Ethical Use of Information Evidence or clue communicate ideas, information Value of information and knowledge. Plagiarism: Information is said to be of value Media Languages Using other people’s words and if it aids the user in making or Codes, conventions, formats, ideas without clearly improving decisions. symbols and narrative structures acknowledging the source of the Authority of the source that indicate the meaning of information Much of the information we media messages to an audience. Common Knowledge: gather daily do not come from a Facts that can be found in primary source but are passed on Examples of Media Language numerous places and are likely through secondary sources such to be widely known. as writers, reporters, and the like. Technical codes Interpretation: Timeliness Include sound, camera angles, You must document facts that Reliability, accuracy, and value types of shots and lighting. are not generally known, or ideas of information may vary based Symbolic codes that interpret facts. on the time it was produced or Include the language, dress or Quotation: acquired. actions of characters, or iconic Using someone’s words directly. Current info symbols that are easily When you use a direct quote, understood place the passage between Types of Libraries Written codes quotation marks, and document Textual codes the source according to a 1. Academic Convention standard documenting style. 2. Public In the media context, refers to a Paraphrase: 3. School standard or norm that acts as a Using someone’s ideas, but 4. Special rule governing behaviour. rephrasing them in your own Messages words. Although you will use Consideration of Info The information sent from a your own words to paraphrase, Literacy source to a receiver. you must still acknowledge and Audience cite the source of the Indigenous The group of consumers for information. Native; local; originating or whom a media message was produced naturally in a particular constructed as well as anyone Types of Media region. else who is exposed to the Indigenous knowledge message. Print Media Knowledge that is unique to a Receipients Media consisting of paper and specific culture or society; Producers ink, reproduced in a printing most often it is not written down. People engaged in the process of process that is traditionally Indigenous communication creating and putting together mechanical. Transmission of information media content to make a finished Broadcast Media through local channels or media product. Media such as radio and forms. It is a means by which Other stakeholders television that reach target culture is preserved, handed Libraries, archives, museums, audiences using airwaves as the down, and adapted. internet and other relevant transmission medium. Indigenous media and information information providers. New or Digital Media Original information created by Content organized and a local group of people. This Legal, Ethical, & Societal Issues in distributed on digital platforms. also refers to content about Media & Information With the use of internet. indigenous peoples that may be Media Convergence distributed through dominant Republic Act No. 10175 The co-existence of traditional forms of media or through forms Or the Cybercrime Prevention and new media. of communication unique to Act of 2012 The co-existence of print media, their people group. Is a law in the Philippines broadcast media (radio and approved on September 12, 2012 television), the Internet, mobile Forms of indigenous media and their which aims to address legal phones as well as others, local examples: issues concerning online allowing media content to flow interactions and the Internet across various platforms. a. Folk or traditional media Cyber b. Gatherings and social Relating to, or involving Criteria of Information organizations computers or computer networks c. Direct observation (such as the Internet) Reliability of information d. Records - may be written, Cyberspace Information is said to be reliable carved, or oral refers to the virtual computer if it can be verified and e. Oral instruction world, and more specifically, is an electronic medium used to Copyright sentences to make them fit form a global computer network Legal device that gives the together while retaining most of to facilitate online creator of a literary, artistic, the original phrasing. communication musical, or other creative work “The Poor Disguise” the sole right to publish and sell The writer has altered the Cybercrime that work. Violation of a paper’s appearance slightly by copyright is called infringement. changing key words and phrases. Cyber Bullying Republic Act No 8293 “The Labor of Laziness” Bullying that takes place online, The Intellectual Property Code The writer takes the time to or using electronic technology of the Philippines paraphrase most of the paper such as cell phones, computers, An Act prescribing the from other sources and make it and tablets over communication Intellectual Property Code and all fit together. tools including social media establishing the Intellectual “The Self-Stealer” sites, text messages, chat, and Property Office, providing for its The writer “borrows” websites. powers and functions, and for generously from his or her Hacking other purposes previous work. Refers to the practice of Plagiarism “The Self-Stealer” modifying or altering computer An act or instance of using or The writer “borrows” software and hardware to closely imitating the language generously from his or her accomplish a goal that is and thoughts of another author previous work. considered to be outside of the without authorization; the creator's original objective. representation of that author's Types of plagiarism: Those individuals who engage in work as one's own, as by not sources cited (but still computer hacking activities are crediting the original author. plagiarized) typically referred to as Fair Use: “hackers”. Small parts may be copied “The Forgotten Footnote” Phishing without permission from the The writer mentions an author’s Is the attempt to obtain sensitive copyright holder. However, even name for a source, but neglects information such as usernames, under fair use - in which you can to include specific information passwords, and credit card use some parts of the material on the location of the material details (and, indirectly, money), for academic or non-profit referenced. often for malicious reasons, by purposes - you must attribute the “The Misinformer” disguising as a trustworthy entity original source. The writer provides inaccurate in an electronic communication. Computer addiction information regarding the Illegal Downloading The excessive use of computers sources, making it impossible to Refers to obtaining files that you to the extent that it interferes find them. do not have the right to use from with daily life. “The Too-Perfect Paraphrase” the Internet. Digital divide The writer properly cites a Way of Piracy An economic inequality between source, but neglects to put in Digital Piracy groups in terms of access to, use quotation marks on text that The practice of illegally copying of, or knowledge of ICT. The has been copied word-for-word, and selling digital music, video, divide within countries (such as or close to it. computer software, etc. the digital divide in the United “The Resourceful Citer” Identity Theft States) can refer to inequalities The writer properly cites all Is the deliberate use of someone between individuals, households, sources, paraphrasing and using else's identity, usually as a businesses, and geographic areas quotations appropriately. method to gain a financial at different socioeconomic (and “The Perfect Crime” advantage or obtain credit and other demographic) levels. The writer properly quotes and other benefits in the other Virtual Self cites sources in some places, but person's name, and perhaps to The persona you create about goes on to paraphrase other the other person's disadvantage yourself virtually arguments from those sources or loss Netiquette without citation. Cyber Defamation The correct or acceptable way of is an unprivileged false communicating on the Internet. statement of fact which tends to harm the reputation of a person Types of plagiarism: or company. sources not cited 2 Types of Defamation: Libel – Written “The Ghost Writer” Slander – Verbal The writer turns in another’s Child Pornography work, word-for-word, as his or Is a form of child sexual her own. exploitation “The Photocopy” Cybersquatting The writer copies significant Is registering, trafficking in, or portions of text straight from a using an Internet domain name single source, without alteration. with bad faith intent to profit “The Potluck Paper” from the goodwill of a trademark The writer copies from several belonging to someone else. different sources, tweaking the