Sunteți pe pagina 1din 8

SOUTHERN LEYTE STATE UNIVERSITY-COLLEGE OF

TEACHER EDUCATION

SPECIAL TOPIC SEMINAR REPORT


ETHICAL ISSUES IN CYBERSPACE
AND
MEDIA INFORMATION LITERACY

By: Jessamie C. Balili


Mth 9:00-10:30
February 26, 2019

DR. STELLA MARIE D. CONSUL – SPECIAL TOPIC ADVISER


Part 1
Engagement

Introduction:

When we attended the seminar last February 20, 2019. It was being tackled
there how cyberspace paved its way and gave space in the advancements and
technologies offered in the world we had today. The things were likewise generated
significant impact in our lives that we sometimes neglect the worse for the sake of
the best. It is in cyberspace, as what I have taken into an account, that we could
see people who are also advanced and very wise in making things vigorously done,
we can see them facing the computers possessing the eagerness to make
programs that would cater the needs of those individuals who are already
depending every information in the computer.
We can see them hovering around the city with their cameras because they
wanted to document what is happening in the world. We can see them everywhere,
in malls, in the market or even in the garden and they too can see us. We are what
makes up the cyberspace. We are the reason why and how it was formed, every
advancements we have right now are the products of our own thinking. We
contributed much in creating the space by which we spare for ourselves, but we
also contributed much in creating something that would turn us into people who
are dependent, self-effacing, and wise but losers.
Cyberspace exemplifies a key which unlocks every door of impossibility. But
we couldn’t predict until when we are going to stop unlocking, until cyberspace
will dominate in this planet, or until we, people become the cyberspace itself.
II. Narrative of Activities/ Experiences

The seminar talks about the Gender and Development it was held February
20, 2019, at SLSU-CTE, social hall. The event officially started with a prayer led by
Mr. Jundel Loreno, followed by the singing of the National Anthem led by Mr. Sandy
Cabilao. After the opening remarks of Ms. Marichu Agustin, she also introduced
the guest speaker Dr. Virginia Valdez who talked about the Gender and
Development and Dr. Efren I. Balaba who also talked about the impacts of
Cyberspace and how it brought the world into something worthwhile and at the
same time alarming place to live in.
The said seminar was quite interested, helpful and applicable to us. Gender
Development was the first topic although the seminar have a problem because of
the sound system but Dr. Valdez discussed the topic even if she don’t have a
microphone, and everybody are listened and all students missed of Dr. Valdez. The
GAD is helpful in order that we are aware that we should not be bias to our students
especially as future teachers. When Dr. Valdez finished discussing the GAD, Dr.
Stella Marie D. Consul give her a certificate of the seminar. And after that Dr. Efren
I Balaba the second speaker tackled about cyberspace. This two topics was
interesting and the experience was something that embellish my thoughts with
how our mind adapts and creates things that we thought we’d never achieve.
Over all, things about cyberspace and Gender and Development has a way
of turning things into something that we could ponder, question that are already
sort of experiences packed up in one because if I hadn’t attended it, maybe I
wouldn’t know of that topic. If I would narrate or give a clearer view of everything I
learned that day I could say that it was indeed productive and worth it.
Insights:

Dr. Efren I. Balaba, our resource speaker explained to us before he started


his lecture that, the people he is going to deal with that day are not the same people
he used to talk lecture daily. And he was hesitant to say yes to the seminar because
of the busy scheduled he had. But despite the odds it was a pure blessing that Dr.
Efren confirmed his presence to tell us things about cyberspace. I was fascinated
by this because it is not every day that we will be granted with the opportunity to
learn about this lesson to think that we are not IT students.
In his lecture he mentioned things about cyberbullying, hacking, illegal
downloading, phishing, digital piracy, and identity thief, cyber defamation.
While he was talking I took a glance of the students around me, everyone
was listening, everyone seems to relate. Even me, of course. And that’s the case
there. Cyberspace has contributed and made a space within ourselves, that if
someone would start talking about it, we instantly relate it with our ways. Especially
with Facebook, and Instagram. Millennial knew it too well to the point of crossing
the boundaries already. We experienced seeing hacked accounts, the deliberate
use of someone’s identity to gain financial advantage from other person’s name.
Everything that is supposed to be used in proper ways has been misleading being
abused.
I have understood that there are things to consider first before we take an
action about the issues in cyberspace, it was inculcated from the very beginning
that we have always weigh down the decisions, good for us who knew but for those
who aren’t we could not tell nor control the minds of these people whose system
has been eaten by the cyber world. They continue to destroy, hack and degrade
people and all we have to do as teacher is to impart to our students what they ought
to do, so they too, like us can become advocate of etiquettes in the cyber world.
DOCUMENTATION

Dr. Efren I. Balaba the Giving the


second resource certificate to Dr.
speaker Efren I Balaba

Taking picture with


my Classmates
Article related to the topic:

Your Name and Privacy --Lost in Cyberspace?


April 01, 1996|GARY CHAPMAN

Shakespeare wrote, in Othello: "Who steals my purse steals trash. . . . But


he that filches from me my good name robs me of that which not enriches him, and
makes me poor indeed." In cyberspace, it's getting harder to hang onto one's good
name. Phil Agre, a professor of communications at UC San Diego, manages an
Internet listserv, or subscription e-mail service, called Red Rock Eaters. He
reported that recently he has been getting complaints from people who are getting
his e-mail but who have not subscribed to his list. Some of them, he's sure, have
been subscribed to the list by e-mail forgers.
Deborah Runkle, a senior program specialist for the American Assn. for the
Advancement of Science in Washington, and some of her colleagues recently
received a grant from the National Science Foundation to study the ethical, legal
and social implications of anonymity and pseudonymity on the Internet. "I got
some e-mail from [U.S. Sen.] Bob Dole yesterday, " Runkle said. "It came from my
assistant in the next room, who forged the headers in the message to show me how
easy it is. "Anonymity and pseudonymity (the ability to conceal one's identity
behind a fictional name) are at the heart of an important struggle in information
policy in the United States. Some people are fighting to eliminate electronic
disguises while others are trying to make them more effective and easier to use.
The principal reasons we want to retain anonymity include privacy and
freedom of expression. In a legal ruling last year, McIntyre vs. Ohio Elections
Commission, the U.S. Supreme Court ruled that citizens' anonymity must be
protected for political speech. McIntyre was a case that involved a woman who
distributed leaflets without identifying who wrote them or where they came from.
We also need forms of anonymity to protect the privacy of cash transactions and
the patterns of our general behavior. But a number of technological developments
are threatening anonymity. Caller ID, which displays the number of incoming
telephone calls and will be introduced in California on June 1, is one example. And
frms interested in electronic commerce on the Internet would like to develop
databases of information on the buying habits of individuals.
On the other hand, digital technologies are providing many new ways for people to
become anonymous. These technologies include digital encryption, "anonymous
re-mailers"--Internet machines that pass on e-mail or files without identifying
where they came from--and systems for secure "digital cash."
David Chaum, a cryptographer who founded the firm DigiCash in the
Netherlands, has invented and patented a method by which people can use
electronic money anonymously, just as they use coins and paper bills. But these
new forms of anonymity raise even more controversies. If people can "hide out" in
cyberspace and protect or fake their identities and activities with layers of
encryption, anonymous re-mailers, untraceable digital cash, forged e-mail or other
techniques, what is to prevent their committing fraud, embezzlement, extortion or
tax evasion in cyberspace? Some radical libertarian activists are already talking
about how electronic anonymity could spell the end of the nation-state.
Bill Frezza, founder of DigitaLiberty, an online libertarian group, has written:
"When the combined might of nations tries to chase society's producers of goods
and services down the 'information superhighway,' making claims on the fruits of
their labor, they will simply disappear into the ether." The question is whether we
can enjoy the benefits of anonymity--freedom of expression and privacy--and avoid
its abuses in a networked world.

http://articles.latimes.com/1996-04-01/business/fi-53693_1_privacy
Insights:

The articles tells us about the insecurity of cyberspace in our lives.


While we continue to post pictures of us in our social media account, there are also
people who tries to steal the identities we made for us, for the sake of business
and most of the time for leisure. The latest news about the computer security
problems – whose names, “Spectre” and “Meltdown”, appropriately convey their
seriousness – is just the latest evidence that true digital security remains out of
our reach.
With the privacy and personal data of hundreds of millions of people at risk,
and especially now with the increasing ubiquity of connected devices in our lives,
the security of digital assets is too important for that kind of treatment. We need to
bolster a culture of responsibility around cybersecurity, combining stronger and
more uniform corporate governance with a clearer government commitment to
enact better defensive policies. A complex hack may not be a C.E.O.’s fault, but it
is absolutely his or her responsibility, investors and consumers need to demand
more from executives to whom they entrust their digital lives. The same holds true
for government. Protection of welfare and livelihood of its citizens is a foundational
principle of government, and yet for more than a decade there has been very little
consequence for nation-states and state-affiliated groups who’ve pilfered the
intellectual property, and violated the personal privacy, of citizens and companies
around the world. To sum it up, there is a need of strengthening a culture of
responsibility, by which we know seems impossible to achieve.

S-ar putea să vă placă și