Sunteți pe pagina 1din 3

Media and Information Evolution of Media  Personal computers -

Literacy i.e. Hewlett- Packard


Pre-Industrial Age (Before 1700s) 9100A (1968), Apple 1
Literacy:  People discovered fire, (1976) OHP, LCD
 The ability to identify, developed paper from plants, projectors
understand, interpret, create, and forged weapons and tools Information Age (1900s-2000s)
communicate and compute, with stone, bronze, copper and  The Internet paved the way for
using printed and written iron. faster communication and the
materials associated with Examples: creation of the social network.
varying contexts.  Cave paintings (35,000 People advanced the use of
Media: BC) microelectronics with the
 The physical objects used to  Clay tablets in invention of personal computers,
communicate with, or the mass Mesopotamia (2400 mobile devices, and wearable
communication through physical BC) technology. Moreover, voice,
objects (radio, television,  Papyrus in Egypt image, sound and data are
computers, film, etc). (2500 BC) digitalized. We are now living in
 It also refers to any physical  Acta Diurna in Rome the information age.
object used to communicate (130 BC) Examples:
messages.  Dibao in China (2nd  Web browsers: Mosaic
 Source of credible information Century) • Codex in (1993), Internet
(contents are provided through the Mayan region Explorer (1995)
an editorial process determined (5th Century)  Blogs: Blogspot
by journalistic values and where  Printing press using (1999), LiveJournal
editorial accountability can be wood blocks (220 AD) (1999), Wordpress
attributed to an organization or a Industrial Age (1700s-1930s) (2003)
legal person).  People used the power of steam,  Social networks:
developed machine tools, Friendster (2002),
 In more recent years the term Multiply (2003),
‘media’ is often used to include established iron production, and
the manufacturing of various Facebook (2004)
new online media.
products (including books  Microblogs: Twitter
Media Literacy: through the printing press). (2006), Tumblr (2007)
 The ability to access, analyze, Examples:  Video: YouTube
evaluate, and create media in a  Printing press for mass (2005)
variety of forms. production (19th  Augmented Reality /
 It aims to empower citizens by century) Virtual Reality
providing them with the  Newspaper- The  Video chat: Skype
competencies (knowledge and London Gazette (1640) (2003), Google
skills) necessary to engage with  Typewriter Hangouts (2013)
traditional media and new (1800)Telephone  Search Engines:
technologies. (1876) Google (1996), Yahoo
Information:  Motion picture (1995)
 A broad term that covers photography/projectio  Portable computers-
processed data, knowledge n(1890) laptops (1980),
derived from study, experience,  Commercial motion netbooks (2008),
instruction, signals or symbols. pictures (1913) tablets (1993)
Information Literacy:  Motion picture with  Smart phones
 The ability to recognize when sound (1926)  Wearable technology
information is needed, and to  Telegraph  Cloud and Big Data
locate, evaluate, and effectively  Punch cards
communicate information in its Electronic Age (1930s-1980s) Stages of Information
various formats.  The invention of the transistor
Technology Literacy: ushered in the electronic age. 1. Identifying/recognizing
 The ability of an individual, to People harnessed the power of information needs. (Why do you
responsibly, appropriately, and transistors that led to the need information?)
effectively use technological transistor radio, electronic 2. Determining sources of
tools. (Using these tools an circuits, and the early computers. information. (Where do you
individual can access, manage, In this age, long distance search for information?)
integrate, evaluate, create and communication became more 3. Citing or searching for
communicate information.) efficient. information. (How do you
Media and Information Literacy: Examples: acquire and store information?)
 The essential skills and  Transistor Radio 4. Analyzing and evaluating the
competencies that allow  Television (1941) quality of information. (How will
individuals to engage with media  Large electronic you determine the quality and
and other information providers computers- i.e. accuracy of the information that
effectively (as well as develop EDSAC (1949) and you have?)
critical thinking and life-long UNIVAC 1 (1951) 5. Organizing, storing or archiving
learning skills to socialize and  Mainframe computers information. (How do you use
become active citizens). - i.e. IBM 704 (1960) the information that you have?)
6. Using information in an ethical, evaluated. Others refer to the
efficient and effective way. trustworthiness of the source in Language
(How will you communicate evaluating the reliability of  Pertains to the technical and
information?) information. symbolic ingredients or codes
7. Creating and communicating Accuracy of information and conventions that media and
new knowledge.  Accuracy refers to the closeness information professionals may
of the report to the actual data. select and use in an effort to
Ethical Use of Information  Evidence or clue communicate ideas, information
Value of information and knowledge.
Plagiarism:  Information is said to be of value Media Languages
 Using other people’s words and if it aids the user in making or  Codes, conventions, formats,
ideas without clearly improving decisions. symbols and narrative structures
acknowledging the source of the Authority of the source that indicate the meaning of
information  Much of the information we media messages to an audience.
Common Knowledge: gather daily do not come from a
 Facts that can be found in primary source but are passed on Examples of Media Language
numerous places and are likely through secondary sources such
to be widely known. as writers, reporters, and the like. Technical codes
Interpretation: Timeliness  Include sound, camera angles,
 You must document facts that  Reliability, accuracy, and value types of shots and lighting.
are not generally known, or ideas of information may vary based Symbolic codes
that interpret facts. on the time it was produced or  Include the language, dress or
Quotation: acquired. actions of characters, or iconic
 Using someone’s words directly.  Current info symbols that are easily
When you use a direct quote, understood
place the passage between Types of Libraries Written codes
quotation marks, and document  Textual codes
the source according to a 1. Academic Convention
standard documenting style. 2. Public  In the media context, refers to a
Paraphrase: 3. School standard or norm that acts as a
 Using someone’s ideas, but 4. Special rule governing behaviour.
rephrasing them in your own Messages
words. Although you will use Consideration of Info  The information sent from a
your own words to paraphrase, Literacy source to a receiver.
you must still acknowledge and Audience
cite the source of the Indigenous  The group of consumers for
information.  Native; local; originating or whom a media message was
produced naturally in a particular constructed as well as anyone
Types of Media region. else who is exposed to the
Indigenous knowledge message.
Print Media  Knowledge that is unique to a  Receipients
 Media consisting of paper and specific culture or society; Producers
ink, reproduced in a printing  most often it is not written down.  People engaged in the process of
process that is traditionally Indigenous communication creating and putting together
mechanical.  Transmission of information media content to make a finished
Broadcast Media through local channels or media product.
 Media such as radio and  forms. It is a means by which Other stakeholders
television that reach target culture is preserved, handed  Libraries, archives, museums,
audiences using airwaves as the down, and adapted. internet and other relevant
transmission medium. Indigenous media and information information providers.
New or Digital Media  Original information created by
 Content organized and a local group of people. This Legal, Ethical, & Societal Issues in
distributed on digital platforms. also refers to content about Media & Information
 With the use of internet. indigenous peoples that may be
Media Convergence distributed through dominant Republic Act No. 10175
 The co-existence of traditional forms of media or through forms  Or the Cybercrime Prevention
and new media. of communication unique to Act of 2012
 The co-existence of print media, their people group.  Is a law in the Philippines
broadcast media (radio and approved on September 12, 2012
television), the Internet, mobile Forms of indigenous media and their which aims to address legal
phones as well as others, local examples: issues concerning online
allowing media content to flow interactions and the Internet
across various platforms. a. Folk or traditional media Cyber
b. Gatherings and social  Relating to, or involving
Criteria of Information organizations computers or computer networks
c. Direct observation (such as the Internet)
Reliability of information d. Records - may be written, Cyberspace
 Information is said to be reliable carved, or oral  refers to the virtual computer
if it can be verified and e. Oral instruction world, and more specifically, is
an electronic medium used to Copyright sentences to make them fit
form a global computer network  Legal device that gives the together while retaining most of
to facilitate online creator of a literary, artistic, the original phrasing.
communication musical, or other creative work “The Poor Disguise”
the sole right to publish and sell  The writer has altered the
Cybercrime that work. Violation of a paper’s appearance slightly by
copyright is called infringement. changing key words and phrases.
Cyber Bullying Republic Act No 8293 “The Labor of Laziness”
 Bullying that takes place online,  The Intellectual Property Code  The writer takes the time to
or using electronic technology of the Philippines paraphrase most of the paper
such as cell phones, computers,  An Act prescribing the from other sources and make it
and tablets over communication Intellectual Property Code and all fit together.
tools including social media establishing the Intellectual “The Self-Stealer”
sites, text messages, chat, and Property Office, providing for its  The writer “borrows”
websites. powers and functions, and for generously from his or her
Hacking other purposes previous work.
 Refers to the practice of Plagiarism “The Self-Stealer”
modifying or altering computer  An act or instance of using or  The writer “borrows”
software and hardware to closely imitating the language generously from his or her
accomplish a goal that is and thoughts of another author previous work.
considered to be outside of the without authorization; the
creator's original objective. representation of that author's Types of plagiarism:
 Those individuals who engage in work as one's own, as by not sources cited (but still
computer hacking activities are crediting the original author. plagiarized)
typically referred to as Fair Use:
“hackers”.  Small parts may be copied “The Forgotten Footnote”
Phishing without permission from the  The writer mentions an author’s
 Is the attempt to obtain sensitive copyright holder. However, even name for a source, but neglects
information such as usernames, under fair use - in which you can to include specific information
passwords, and credit card use some parts of the material on the location of the material
details (and, indirectly, money), for academic or non-profit referenced.
often for malicious reasons, by purposes - you must attribute the “The Misinformer”
disguising as a trustworthy entity original source.  The writer provides inaccurate
in an electronic communication. Computer addiction information regarding the
Illegal Downloading  The excessive use of computers sources, making it impossible to
 Refers to obtaining files that you to the extent that it interferes find them.
do not have the right to use from with daily life. “The Too-Perfect Paraphrase”
the Internet. Digital divide  The writer properly cites a
 Way of Piracy  An economic inequality between source, but neglects to put in
Digital Piracy groups in terms of access to, use quotation marks on text that
 The practice of illegally copying of, or knowledge of ICT. The has been copied word-for-word,
and selling digital music, video, divide within countries (such as or close to it.
computer software, etc. the digital divide in the United “The Resourceful Citer”
Identity Theft States) can refer to inequalities  The writer properly cites all
 Is the deliberate use of someone between individuals, households, sources, paraphrasing and using
else's identity, usually as a businesses, and geographic areas quotations appropriately.
method to gain a financial at different socioeconomic (and “The Perfect Crime”
advantage or obtain credit and other demographic) levels.  The writer properly quotes and
other benefits in the other Virtual Self cites sources in some places, but
person's name, and perhaps to  The persona you create about goes on to paraphrase other
the other person's disadvantage yourself virtually arguments from those sources
or loss Netiquette without citation.
Cyber Defamation  The correct or acceptable way of
 is an unprivileged false communicating on the Internet.
statement of fact which tends to
harm the reputation of a person Types of plagiarism:
or company. sources not cited
 2 Types of Defamation:
 Libel – Written “The Ghost Writer”
 Slander – Verbal  The writer turns in another’s
Child Pornography work, word-for-word, as his or
 Is a form of child sexual her own.
exploitation “The Photocopy”
Cybersquatting  The writer copies significant
 Is registering, trafficking in, or portions of text straight from a
using an Internet domain name single source, without alteration.
with bad faith intent to profit “The Potluck Paper”
from the goodwill of a trademark  The writer copies from several
belonging to someone else. different sources, tweaking the

S-ar putea să vă placă și